Which of the following reports provides a summary of the complete pen testing process, its outcomes, and recommendations?
Correct Answer:
B
Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast.
On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops intermittently.
What could be Tyler issue with his home wireless network?
Correct Answer:
A
Mason is footprinting an organization to gather competitive intelligence. He visits the company's website for contact information and telephone numbers but does not find any. He knows the entire staff directory was listed on their website 12 months. How can he find the directory?
Correct Answer:
D
Software firewalls work at which layer of the OSI model?
Correct Answer:
A
Which one of the following is a command line tool used for capturing data from the live network and copying those packets to a file?
Correct Answer:
D