Exam 3: VoIP Penetration Testing
Exam 1: Wireless Network Penetration Testing10 Questions
Exam 2: Advanced Wireless Testing10 Questions
Exam 3: VoIP Penetration Testing10 Questions
Exam 4: VPN Penetration Testing10 Questions
Exam 5: Wardialing10 Questions
Exam 6: Bluetooth and Handheld Device Penetration Testing10 Questions
Exam 7: Telecommunication and Broadband Communication Penetration Testing10 Questions
Exam 8: Communication Media14 Questions
Select questions type
In many VoIP devices, SNMP is an insecure protocol listening on port ____.
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
C
TFTP servers usually use UDP port ____.
Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
D
____ is an SIP scanning and fingerprinting tool that analyzes SIP message responses to find out the type of device it is probing.
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
C
____ was developed to attempt to determine the password for every user of SIP messages.
(Multiple Choice)
4.8/5
(39)
A TCP ____ scan involves sending a TCP SYN-flagged or ACK-flagged packet to a commonly used TCP port on the target host.
(Multiple Choice)
4.9/5
(39)
____ is a port scanner that supports several different types of scans, including TCP SYN scanning and UDP scanning, in one utility.
(Multiple Choice)
4.8/5
(33)
In a(n) ____ attack, the attacker disturbs the flow of the message packets in order to make it impossible for the user or server to handle the call.
(Multiple Choice)
4.7/5
(40)
____ is a method of connecting to a port on a remote target to determine further information about the associated services running on that specific port.
(Multiple Choice)
4.8/5
(23)
____ is a command-line tool used for OPTIONS scanning, which is useful for stress testing and diagnosing SIP service issues.
(Multiple Choice)
4.8/5
(37)
In ____, an attacker sends a message that looks genuine, but in reality, the message is broken or fuzzed.
(Multiple Choice)
4.8/5
(33)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)