Month: January 2021

Ricardo has discovered the username for an application in his target’s environment. As he has a limited amount of time, he decides to attempt to use a list of common password he found on Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application. What type of attack is Ricardo performing?

Ricardo has discovered the username for an application in his target’s environment. As he has a limited amount of time,…

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks. What is tool employed by James in the above scenario?

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and  location tags of recently…

George is a security professional working for iTech Solution. He was tasked with securely transferring sensitive data of the organization between industrial systems. In this process, he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10-100m. What is the short-range wireless communication technology George employed in the above scenario?

George is a security professional working for iTech Solution. He was tasked with securely transferring sensitive data of the organization…