00:00

QUESTION 81

- (Topic 1)
What section of the penetration test or ethical hacking engagement final report is used to detail and prioritize the results of your testing?

Correct Answer: C

QUESTION 82

- (Topic 2)
Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?

Correct Answer: D

QUESTION 83

- (Topic 3)
John works as a Professional Ethical Hacker for we-are-secure Inc. The company is using a Wireless network. John has been assigned the work to check the security of WLAN of we-aresecure.
For this, he tries to capture the traffic, however, he does not find a good traffic to analyze data. He has already discovered the network using the ettercap tool. Which of the following tools can he use to generate traffic so that he can crack the Wep keys and enter into the network?

Correct Answer: A

QUESTION 84

- (Topic 1)
When DNS is being used for load balancing, why would a penetration tester choose to identify a scan target by its IP address rather than its host name?

Correct Answer: C
Reference: http://www.flashcardmachine.com/sec-midterm.html

QUESTION 85

- (Topic 4)
Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?

Correct Answer: A