The following is a list of questions that will help you test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- Which of the following would be used to conduct attacks against password hashes?
- Cain and Abel
- Wireshark
- John the Ripper
- tcpdump
- During a penetration test, you eavesdrop on a network segment and find an ICMP message with a message type value of 5. What type of message is this?
- Echo request
- Destination unreachable
- Redirect
- Echo reply
- In a structured penetration test, which one of the following steps occurs first?
- Determine the scope of the test.
- Run a vulnerability scan.
- Conduct social engineering.
- Conduct network reconnaissance.
- An analyst is unable to gain access to an internal network containing the organization's database server. However, the analyst is able to access a web application that relies upon that database. Which of the following attacks can help the analyst gain...