00:00

QUESTION 126

Which of the following allows attackers to draw a map or outline the target organization's network infrastructure to know about the actual environment that they are going to hack.

Correct Answer: D

QUESTION 127

What tool can crack Windows SMB passwords simply by listening to network traffic?

Correct Answer: D

QUESTION 128

_____ is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and celebrities who have access to confidential and highly valuable information.

Correct Answer: B

QUESTION 129

Which protocol is used for setting up secure channels between two devices, typically in VPNs?

Correct Answer: C

QUESTION 130

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?

Correct Answer: D