Question 7

- (Topic 2)
What difference would you expect to result from running the following commands;
(I). S dig .ns domain.com target.com -t AXFR
and
(2). S dig .ns.domain.com target.com -t IXFR=1002200301

Correct Answer:B

Question 8

- (Topic 2)
Which of the following statements are true about NTLMv1?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABC

Question 9

- (Topic 1)
You've been contracted by the owner of a secure facility to try and break into their office in the middle of the night. Your client requested photographs of any sensitive information found as proof of your accomplishments. The job you've been hired to perform is an example of what practice?

Correct Answer:B

Question 10

- (Topic 4)
Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?

Correct Answer:A

Question 11

- (Topic 4)
Which of the following tools is an example of HIDS?

Correct Answer:D

Question 12

- (Topic 1)
While scanning a remote system that is running a web server with a UDP scan and monitoring the scan with a sniffer, you notice that the target is responding with ICMP Port Unreachable only once a second What operating system is the target likely running?

Correct Answer:A

START GPEN EXAM