00:00

QUESTION 46

Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florida. They have given her permission to perform social engineering attacks on the company to see if their in-house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa.
She states that she needs the receptionist's network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for.
What principal of social engineering did Julia use?

Correct Answer: A

QUESTION 47

The first and foremost step for a penetration test is information gathering. The main objective of this test is to gather information about the target system which can be used in a malicious manner to gain access to the target systems.
ECSAv10 dumps exhibit
Which of the following information gathering terminologies refers to gathering information through social engineering on-site visits, face-to-face interviews, and direct questionnaires?

Correct Answer: A

QUESTION 48

Which of the following protocols cannot be used to filter VoIP traffic?

Correct Answer: D

QUESTION 49

How many possible sequence number combinations are there in TCP/IP protocol?

Correct Answer: C

QUESTION 50

When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

Correct Answer: B