00:00

QUESTION 31

Which of the following reports provides a summary of the complete pen testing process, its outcomes, and recommendations?

Correct Answer: B

QUESTION 32

Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast.
On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops intermittently.
What could be Tyler issue with his home wireless network?

Correct Answer: A

QUESTION 33

Mason is footprinting an organization to gather competitive intelligence. He visits the company's website for contact information and telephone numbers but does not find any. He knows the entire staff directory was listed on their website 12 months. How can he find the directory?

Correct Answer: D

QUESTION 34

Software firewalls work at which layer of the OSI model?

Correct Answer: A

QUESTION 35

Which one of the following is a command line tool used for capturing data from the live network and copying those packets to a file?

Correct Answer: D