Tumgik
#id like feedback pls :'D
celestibears · 2 years
Text
Tumblr media
they need some healthy distractions
603 notes · View notes
angrylizardjacket · 5 years
Text
when i said it i thought it was true [1] {Ben Hardy}
Anon asked: could you do an imagine where ben is the reader’s ex and they are somehow working together on the set of bo rhap and they fall in love all over again ☺️ could you make it angst-y and then end with fluff? i love your writing so much!!
Anon asked: could you do an imagine where the reader is in bo rhap, maybe playing as one of roger’s gfs or something and she kind of falls in love with ben while filming the scenes with him as roger 💖 very fluffy pls :D
A/N: 3124 words. Super AU version of BoRhap being filmed in the fic. There’s gonna be another part, that will fill the prompts better. This might end up being a series. I hope you enjoy. Feedback would be nice.
When your manager rings you, telling you that you’d landed a part in the Queen Biopic Bohemian Rhapsody, you were elated. Freddie Mercury was a bit of a personal hero of yours, and to be a part of his story on the big screen, it was sort of a dream come true. 
In your first meeting, you sign a nondisclosure agreement, and you’re given the latest draft of the script to start learning, as well as a character brief. The script calls your character ‘Amanda’, the girlfriend of Roger Taylor who he eventually realises he wants to settle down with. You’d seen pictures of young Roger Taylor, you wouldn’t lie, you were excited for the role. Honestly, even today he was still quite a fox.
The point is, you were excited to have a fun time on set with a pretty blonde, make some new connections, and earn some good money. Some really good money.
The other shoe drops when you’re flicking through Instagram, and one of the stan accounts you follow has posted a leaked screenshot of the proposed cast list, and there’s your name, right beside the name of the last person you wanted to pretend to be in love with. Ben Hardy; pretty blonde extraordinaire, and your ex-boyfriend.
The table read is... awkward. 
The two of you are sat next to each other, and barely spoke two words to each other. You feel unprofessional the whole time, but you’d rather be anywhere else in the world, and the delivery of some of your lines falls a little flat. The director casts a concerned look between yourself and Ben as you rattle of what’s meant to be banter like you’re reading the news paper.
“They’ve got no damn chemistry; it’s like watching a celebrity divorce hearing.” When the Director vents to one of the producers in the hall outside after the reading, you manage to catch it where you’re just about to come out of the bathroom.
“They’ll be better on set, I promise, it’s just jitters.” She tries to soothe his nerves, and they’re off soon after, and you’re left with a cold, sinking sensation in your stomach.
“You’re Y/N, aren’t you? How are you finding the set?” The guy who greets you on your first day on the Eastenders set smiles with such casual ease it feels like you’ve known him for a while, instead of having just met him.
“Yeah, that’s me.” You agree with a quick nod, rocking back on your heels as you gaze around the space, trying not to look at him for too long. “It’s a bit overwhelming.” Actually, what’s overwhelming is that he’s talking to you. He’s Ben fucking Hardy, pretty-boy on the soap-opera scene, and he’s talking to you on your first day.
“Yeah, you’ll be right though; if you need any help or anything, just give us a yell, yeah?” And you realise he probably doesn’t know who you’re playing, or how you’re involved in that Season’s arc, but you certainly did.
“I didn’t know you could play drums.” You’re trying to be casual when you say it, but you see Ben tense where he’s sitting on a sofa in the rehearsal room, script and pencil in hand.
“I can now, that’s all that really matters.” He’s giving off such strong ‘please leave me alone’ vibes that it almost hurts, and you have to push through the knot in your stomach and sit down next to him.
“Ben, we need to at least be civil.” You say quietly, and he looks at you, expression a little forlorn.
“Y/N, we are civil, and we’ve done this before. Let’s just keep it professional, okay?” His tone leaves little room for argument, and you nod in agreement with a small smile, and pull out your phone, waiting for the rehearsal director.
“Hey there, baby, I don’t think I’ve seen you around here; I know I’d recognise your face.” You purr, running your hand delicately over the collar of Ben’s shirt, as his eyes widened and he spluttered to form a sentence, just as the script had told him to. 
Your character was more a plot device than anything, when Ben’s character is at a low point, his main romance is on a break, and he meets you, a temptress in all black. Your job is to give his character a realisation, he starts as your cocaine dealer when his supplier can’t make the drop, and he falls for you. Depending on the audience reaction, you knew the producers were waiting to see if they kill you off or have you recover from your addiction. The point is, your fate’s uncertain at the end of the Season, and Ben’s character realises he has to get out of the drug trade.
“I’ve got something for you, from Oskar. Can we go somewhere more private?” When he speaks, it’s with surprising confidence, and he steps up from the bar stool and into your space, smiling as your face lights up. The director calls cut after a moment, and you step back, smile sliding to something genuine as an assistant comes in and straightens your loose, black silk shirt, and they reset the shot for a new take.
“Ben, could you try less flustered? You’re here to deliver drugs, you’re not a schoolboy.” The director’s voice was kind as she came up to the two of you, and Ben agreed easily before she turned to you. “Great job, Y/N, don’t be afraid to be more even more forward, if you feel it.” As soon as you nod in understanding, she absconds, and you half laugh.
“If I was any more forward I’d be in your lap.” You snickered, voice quiet as you dipped your head to hide how you were faintly flustered. Ben was quiet, just watching you for a moment, but before you noticed, the director called for everyone to standby.
“I’m after Maggie, do you know where I could find her?” Ben starts as soon as the cameras start rolling, brow furrowed as he leans across the bar to speak to the bartender, and that’s your cue to enter the scene.
“Hey there, baby, I don’t think I’ve seen you around here; I know I’d recognise your face.” And when you say it this time, he smirks back at you, a little cocky, and you can feel the way it makes your heart flutter and you know it’s not as fake as it should be.
Before filming even starts, the producers have essentially forced you and Ben into bonding sessions which, if this were several years ago, would have just been dates. Now they’re awkward and tense, and you tend to bring heavily highlighted scripts.
“I saw you in that Wes Anderson movie last year. It was a really good performance, one of your best.” He offers over coffee. The idea that he’d kept up with enough of your work to label one ‘your best’ has you a little shocked, and something in your heart warms as you thank him softly.
It’s gotten easier to hang around with him, and it’s even easier to pretend to be in love with him in rehearsals. It’s like riding a bike, how easy it is to let yourself smile and lean into him, to let the banter flow easily between the two of you, fond jabs that edge on insulting coming as easily as breathing.
Joe mentions that he thought the two of you worked together before, and when you reply that you’d dated for almost a year, he goes very quiet, eyes going wide. After a beat, he admits it explains a lot.
“X-Men did you real dirty.” You’re half paying attention to an interview with Roger Taylor that the two of you had been instructed to watch together. You’re both in his trailer, sitting on opposite ends of the sofa as you watch in almost complete silence.
“What?” He asks, after a beat, your words having taken a moment to process.
“Killing you off like that; they could have gotten so much mileage out of your character.” The way you say it is far too well thought out to be an idle thought. Ben smirked.
“You just liked the leather pants.” He muttered, but you’re silence is answer enough. You know he sees your embarrassed smile, but you can’t bring yourself to deny it.
“Hey, do you wanna grab a drink after and go through notes and blocking and stuff?” You’re shooting your third episode, and you’re far more comfortable on set by now. Agreeing easily, you let Ben drive the two of you to what he claims is the best pub in town, and you sit in one of the more secluded booths to talk.
It turns out he’s just as much a fan of you as you are of him; you’re known more for your bit-parts in long-running series, it seems like the only show you hadn’t been a part of so far had been Eastenders, it was only a matter of time. It’s an innocent night, true to his word, all you do is talk, and discuss the script. There is one part of the upcoming script that has you a bit nervous. 
“Listen, honestly just go for it; it’s not meant to be sweet or anything, I’m literally taking coke from you.” You tell him, fidgeting, and he’s hums thoughtfully.
“You sure? We can talk to the director, I’m sure-” He offers, but you laugh to hide your nervousness.
“Nah, let’s knock it out of the park, the script says go for it so just go for it.” You assured him, heart rate already quickening at the mere thought of it. 
The next day, before the scene, the director comes over to talk you through it, making sure that if anything becomes uncomfortable, that you can talk to her. Both you and Ben assure her that it’s fine.
“You’re far too cute for this line of work.” You say as you hold a baggie of “cocaine” up to the light, smile playing on your lips.
“Cute? Ouch, you really know how to wound a man, you know.” He says, leaning back against the sofa in the hallway of the grubby hotel your character was staying in. He’s watching you with interest, small smile playing on his lips.
“Cute’s not a bad thing, baby, but you look like you should be making coffees or playing football in the sun, not here, not with me.” And you tap out a little of the powder onto your hand, pretending to snort it before you turn to him, his expression dark and hungry, and he kisses you, aggressive, almost desperate, and you lean into it, almost forget you’re playing a role with his hand on the back of your neck. When he lets go, when he pulls away, your eyes are still closed and you chase his lips for a moment. Eyes flickering open, you see him smirking down at you where he’s standing, and you both know it wasn’t entirely acting.
“You don’t know anything about me.” He growls, and you know you have to smile like you’re into it, like it’s a challenge, but instead, you duck your gaze, giving a small laugh and wiping at the nostril you’d just “snorted cocaine” through, before looking up at him through your eyelashes.
They call cut, and the director announces, almost a little awed, that she’s pretty sure they got the the take, actually says she’s not sure if she could getting a better take if they tried again. Ben seems far too pleased with himself. 
“They want us to tell the public we’re together.” You’re resting your head on Ben’s chest laying at the back of the tour-bus set, and his hand is resting on your waist, which is bare for the crop top and booty shorts they’ve put you in.
“Yeah, I heard.” He replies, voice equally quiet. “I think we’ve got a meeting about it tomorrow morning.” Gwil and Rami are actually playing scrabble at the front of the bus, and Joe is talking to Singer, the director.
“It’s a bad idea.” You’re so frank that you feel Ben freeze, and you heave a sigh. “It’s good for the movie, but Ben...” You trail off, and you feel it when he forces himself to relax. “It wouldn’t be real, it would just be weird.”
“Y/N, we’re actors.” He says very pointedly, and when you turn, resting your chin on his chest, he looks tired, a little exasperated. “It’s just a business deal.” He assured, and you let out a low, thoughtful grumble. 
“We’ll discuss it tomorrow.” You allow, and he nods once, shifting to a more comfortable position, and you go back to resting your head on his chest, eyes fluttering closed as Singer called for the shot to be reset and a bunch of people came and straightened your clothes, and touched up your makeup, all without you having to move much.
You agree to the terms set forth in the meeting easily, the story being that your relationship rekindled on set, and that you were now madly in love, mirroring the relationship you were portraying on screen.
“Wait, does that mean-?” Ben leans forward in his chair, with his heart in his throat as he followed their logic, thinking through the plot of the movie. “Like engaged?” He asked.
“Seems a bit fast.” You agreed, voice level enough that someone might mistake you for calm rather than internally freaking out, and your managers shared a look.
“There will be a public proposal during or after the world premiere, that’s up to you both, and after the movie is out on DVD, you can go your separate ways.” They assured, but your mouth fell open.
“You know he left me for X-Men, right?” You splutter, and Ben’s eyes widen as he turns to you with a scoff.
“You’re the one who said the distance was too much for us while I was in Cairo.” He snapped, and you threw your hands in the air.
“I was offering to come and stay with you instead, but you said you were too busy!” That was enough to shut him up, his mouth snapping closed as he turned away sharply, huffing out a resigned sigh.
“We have a few brands and restaurants who are interested in sponsoring, and the producers are willing to increase both your salaries if you go through with it for the full duration.” Your manager informed you both carefully, and you and Ben shared a resigned look.
“Fake intend to marry me for like three months?” He asked, voice low and bitter, and after heaving a long sigh, you look to your managers,
“Fine.”
“I think I love you.” Ben’s character shows up at your character’s door, and you open it in a silk robe. 
“Hello to you too.” You laughed, but he’s so serious, so sincere, and when he doesn’t flinch, doesn’t offer anything else, you step up to him, pressing your lips to his, and he wraps his arms around you, hands sliding against the silk over your hips, and you pull back.
“You’re too sweet for me, baby,” voice so low it’s barely a whisper, he’s the one who chases your lips this time, but your catch his chin, and his eyes open. 
“You’re high.” He says softly, voice raw and a little desperate.
“And you’re my dealer.” You push him back gently, going to close the door and his expression turns angry.
“That doesn’t mean anything; I love you, Maggie.” His words hang heavily in the air, but before you can respond, they call for cut. You’re told to play it more like it hurts to try and turn him down, and you agree, smiling and nodding all the while. Everyone sets up for another take and you close the door.
When you kiss him this time, his hands are holding your face, and you’ve got your arms around his neck, and it’s like the world falls away from around you. It’s not acting now, hasn’t been for weeks, almost months now, not since he’d asked you out officially. Every time you kiss him you’re desperate to drown in his embrace, and he kisses you like it’s just the two of you, no cameras, no scripts.
“You’re-” and he cuts you off with another quick kiss, which has you laughing a little sadly, “Peter you’re too sweet for me.” He rests his forehead against yours, heaving a sigh.
“I know you’re high.” He says gently, and you don’t push him away this time, just lean back, your finger lifting his chin.
“And you’re my dealer.” You tell him, expression falling.
“That doesn’t mean anything, that doesn’t matter; I love you.” And you know that in that moment, the words mean so much more than the script, than these characters, than the show; he loves you. Ben loves you.
You avoid him, outside of filming, until you actually get a call from your manager telling you you’re contractually obligated to be seen in public together at least once a week. Even while filming you’re short with him, and he’s quick to get away from you the moment he doesn’t need to be around you, which was getting to be pretty bad, seeing as how you had been blocking a sex scene.
After the call, you and Ben get a drink. It’s awkward at first, though that’s unsurprising. After a long sip of his beer, he pats his thighs where he’s sitting in the armchair across from you. You make a face at him, shaking your head. 
“It’ll look less suspicious than if we’re shouting at each other across the table.” He hissed, and you groaned, obliging and crossing to sit yourself in his lap. He’s warm and secure, and he wraps his arm around you like it’s second nature. “Let’s not make this weird.” He said gently, and you nod.
“As for tomorrow’s shoot,” you said softly, leaning in to make sure no-one else heard, and he nodded, humming softly, “we’re professionals, and,” after a beat you cleared your throat pointedly, “it’s not like we haven’t done it before.”
“Not in front of a camera crew we haven’t.” Ben says with a smirk, and you snicker in agreement. “It’s gonna go fine; this is all gonna go fine, I promise.” And when you raise your eyebrows at him in surprised question, he just laughs softly, and brings you in for a chaste kiss. “It’s only until the DVD’s released.” He assures you, and you let your expression fall, already weary.
“Ben, that’s over a year away.”
715 notes · View notes
ships-and-saints · 7 years
Text
Moonlight Escape at Adarlan University [Celaena x Rowan magical AU]
So... this is what i’ve been dreaming up while working on PSaOE :) I’ve been thinking of writing a Celaena x Rowan modern AU fic set in a magical/futuristic world. it’s just bulletpoints right now, but here’s a drabble that may or may not be featured in the future story, or I may pull some parts out and work them around. It’s probably slightly OOC, I don’t know, I wrote it for fun and to be more casual so pls don’t take it too seriously~
Sorry if there are some mistakes; haven’t looked it over too carefully since it’s somewhat of a drabble! Feel free to leave feedback if you liked it/want to read more like it :D
Word Count: 2630 [ read on fanfiction ] | [ read on ao3 ]
It was nearly midnight on a Sunday, and she couldn't fall sleep. Celaena Sardothien growled as she leapt up from where she had been slouched on her lush satin bed, and she paced the floor restlessly. She was in her dormitory room at the prestigious Adarlan University of Magic and Research, and she had had a particularly rough day.
She hadn't woken up feeling like the day was going to be shit. Everything had started off fine; she had gotten crepes for breakfast with Elide, lounged around procrastinating for a bit, and then finally gathered her notebooks and books to study in the sprawling campus library.
There, she had run into Rowan-rutting-Whitethorn, a gods-damned know-it-all and an arrogant fucking prick. He was just a third-year student but he was a teaching assistant for one of her first-year magic courses, and he acted like he was above all the rest of them. At the library, he had caught her idly doodling on a library book and arrogantly reminded her that she was damaging school property. And she basically told him to fuck off and not talk to her until he had removed the stick up his arse.
Rowan was a teaching assistant for the beginner magic course, Laws and Limiters of Magic. He was from the reputable Whitethorn household in the country of Wendlyn, so he had been trained in magic since he was old enough to read and write, even after his parents had been murdered. The Whitethorn house had served Queen Maeve faithfully for many years, and perhaps Rowan had appeared particularly gifted because she recruited him into her service when he turned 16, and he, of course, had accepted with honor.
Rowan had lived at his Uncle's estate with many of his other cousins and wanted to escape his often-insufferable family for a while, so he requested Maeve to give him a research mission in Adarlan while he enrolled at Adarlan University.
Queen Maeve didn't say anything at first as she considered his request. This might be a good way for her to keep an eye on the happenings across the ocean... She agreed to send him, as well as Lorcan and Fenrys, to enroll at Adarlan University. She also mentioned offhandedly that her niece Aelin Galathynius may also attend the university in the future.
Rowan recalled a conversation he had with Maeve. "When she arrives… Make sure she doesn't get into any trouble, will you?" Maeve's violet eyes flickered to Rowan's face, who was kneeling on one knee in the center of the room.
She drifted over to inspect one of the many poisonous and rare plants she was cultivating in the throne room. "She doesn't look anything like me. You'll know her when you see her. Those teal and… gold eyes. Ashryver eyes, like her mother's." Maeve waved her pale hand dismissively.
Bright turquoise irises and rings of gold around the pupils. Until recently, it hadn't clicked that Celaena Sardothien and Aelin Galathynius were the same person.
Perhaps he was annoyed that she was going by a different name, tricking people into believing she was someone she was not. In the hushed library, he had revealed to her how he worked for Queen Maeve, like it was supposed to scare her into submission or awe or something. And he acted like Celaena, even though she was a blood relative to Maeve, was beneath him because he had been recruited to work for the bitch-queen of Wendlyn and she hadn't.
Celaena's perfectly arched eyebrows raised higher and higher, and after he was done with his little tirade, she just snorted and drummed her fingers on the table. Her mother, Evalin Galathynius, had cut contact from Maeve before Celaena had been born. So she had never met Maeve, and she vaguely remembered her mother saying something about how Maeve used people to get what they want.
In fact, she went by Celaena Sardothien and not her real name anymore, because people often tried to get close to her, either to take advantage or curry favor with her, to try to gain access to Queen Maeve. But it turned out that even using a different name wasn't enough to avoid people like Rowan, who thought the gods-damned sun shone out of that woman's arse.
She stopped drumming her fingers and leaned forward to sneer at him. "I pity you for being bound to someone else's will and for being a brainless soldier playing an arrogant student. You don't know anything about me, Rowan Whitethorn, and you can't scare me by being a kiss-ass."
Rowan's checked anger had slipped at that, and a small gust of wind picked up. Students nearby began shifting uneasily. Nevertheless, Celaena had thrown her own defenses up. She never turned down an excuse to brawl.
Both of their magical energies elevated enough that they were scolded and thrown out of the library soon after. Celaena had been docile and cordial, blaming Rowan for instigating the fight. Rowan had acted ever the gentleman, bowing his head and promising it wouldn't happen again. The library woman on duty agreed to let them go as it was their first offense and as long as it didn't happen again.  
Celaena simpered sweetly at Rowan when she heard that, and they parted ways outside the library without further incident. She loved books, and a quickie brawl with Rowan certainly wasn't worth getting banned from the library. But she didn't get any studying down after their run-in. Instead, she went for a run outside and trained at the gym until she worked off some of her pent-up energy.
And then wasted time up until now. She had to get up early for morning classes, too.
Dammit. Damn it all. Celaena was still pacing in her dorm room, which was quickly becoming too small to contain her rising fury as she continued to think about what had happened earlier. She needed to do something, or she was going to break everything –
A glass of water exploded on her nightstand, and Celaena nearly screamed in frustration, but she worked on calming herself down. She didn't bother with the glass shards strewn all over the nightstand and ground. Instead, she focused on her breathing and cast her mind to find a goal for her to focus on, to keep her mind occupied. To keep her vast magic from slipping the leashes and going out of control, and setting fire to the gods-damned drapes again.
Celaena pulled on a black zip-up hoodie over her turquoise V-neck and combat boots over her distressed jeans. Maybe a walk would help clear her mind. She looped her blonde hair into a loose bun atop her head.
Her fingers brushed against something in her hoodie's pocket, and she fished her handheld device out and stared at it for a second before casually tossing it onto the bed and walking out. She didn't want to talk to anyone, and she didn't want anyone to find her. She silently slipped out of her room and down a back stairwell to exit the building.
As soon as Celaena felt the cool, fall breeze sweep over her face, she sighed in relief. The leaves were starting to turn autumnal hues, and the weather had started to turn chilly. She began walking with no destination in mind but ended up in front of the ancient music building. The wind hummed and leaves rustled as she stared up at the intricate columns.
Well, she might as well go in. It was unlikely anyone would be here past midnight on a Sunday. She reached into her pocket to grab her –
Dammit. She had left her handheld, which doubled as her ID, in her room. Not that it mattered too much. She shoved her hand into her back pocket and pulled out a flat device, shaped like a card. She pressed a button and the screen flickered to life, scanning her face to unlock the facial recognition screen. As soon as the device recognized her as the owner, it unlocked and revealed a menu with several settings.
Squinting, Celaena peered at the bright screen and modified a couple options before holding the device up to the electronic scanner on the front doors. The scanner beeped in recognition and flashed green, allowing her to haul the doors open and slip in.
She wandered down the lonely halls, the sound of her boots reverberating off the walls. On impulse, she peered into a dark room at the end of a hallway, slipped inside, and flicked on the light.
It was a small practice room, with a piano, a piano bench, and a music stand. There was a stool tucked in one corner and scattered sheet music was stacked haphazardly on a narrow bookshelf. Celaena sighed and dropped her hoodie on the floor.
She briefly adjusted her seating on the piano bench and then began warming up on the keys with scales. Celaena noted that the keys were mostly in tune, and she took a few minutes to learn the piano, to learn the shape and sound of its keys before she really began to play. The music and her anguish twined together, flooding the room with sound and pure emotion.
She played the lullaby her mother used to sing her. Then a few of the bittersweet songs of the people. And then the ballad she had composed when she was 15, in honor of her friend Nehemia who had died long ago in a freak accident. Celaena had never understood why the gods hadn't taken her as well, back then.
She played continuously for twenty minutes before finally pausing to take a break. Sweat dripped down her face from the effort, and the tears that had streamed down her face earlier had already dried. She moved her hand to brush stray strands of hair from her face –
Somebody coughed intentionally behind her.
Celaena jumped, slamming her hands down. The keys rang out in discord, and the wind of her movement sent some of the pages stacked on top of the piano fluttering down. She hastily wiped the mascara tracks from her cheeks and whirled around.
"Are you spying on me?" she accused, embarrassment creeping up her cheeks as she realized she had been so lost in her music that she hadn't noticed gods-damned Rowan had been standing there for gods know how long. She hurriedly began gathering the fallen pages up to keep her hands busy. Rowan bent down to pick up a page that had landed near him and she snatched it from him, smoothing it out and adding it neatly to the stack.
Rowan had silver hair that nearly reached his broad shoulders, and he was wearing a simple, black v-neck. A wicked tattoo curved up his neck and creeped up the side of his jaw. He shrugged nonchalantly, but his green eyes were unfathomable as he watched her. "No, I just happened to be walking by."
Celaena's turquoise and gold-rimmed eyes narrowed as she snorted, trying to keep the mortification from her face.
"You just happened to be walking by the music building? Oh yeah, I forgot about all of the music classes you take," she drawled and pursed her lips at him.
Rowan couldn't help but chuckle at her dripping sarcasm and how fast she had caught him in his lie. "Okay, you're right. I just wanted to… make sure everything was all right after earlier." His gaze pinned hers, as if he could read the answers directly from her face.
Celaena narrowed her eyes at him and schooled her face into a smooth, emotionless expression. She didn't know what magical powers he was keeping secret, so she double- and triple-checked her mind's barrier. She blinked at him.
"I'm fine. And even if I wasn't, it would be none of your business," she replied coolly.
"That's –" Rowan inhaled sharply through his nose and then exhaled. "I've been harsh on you. And I… said some things I didn't entirely mean."
"I don't expect any special treatment," she snapped. What was his problem? After what happened earlier in the library, now he was following her around like a lost puppy? Celaena could feel a headache coming on from the mental whiplash.
"But still… I should have been more understanding," he admitted. Celaena just stared at him as if she were weighing his words.
"As far as you know, I'm just another, first-year student that goes to Adarlan University. Young. Hopeful. Uninteresting." Her sharp, perceptive eyes bored into his as she enunciated every word with a clipped tone. "I don't care what you do outside of school or whose employment you've weaseled your way into, as long as you stay out of my business. And as far as Maeve goes, I've never known my Aunt Maeve, and I don't care to know her," she ground out, defiance burning in her eyes. She was honestly considering punching him right in the nose if he was stupid enough to challenge her.
Rowan held his hands up palms facing her, trying to pacify her aggression. "I'm not – I wasn't trying to convince you to or anything. I just wanted," he took a deep breath, "I just wanted to say that I'm here if you wanted to talk about it. I know what it's like to have… family troubles."
Celaena just blinked and raised her eyebrows at him in disbelief. She rolled her eyes up at the ceiling and sighed. "Thanks. That's nice of you, but I don't want to talk about it. Goodnight."
With that, she grabbed her hoodie from where she had dropped it on the floor earlier and tried to storm out. Unfortunately, Rowan was still in the doorway. He moved to fully block her exit and her anger nearly snapped then, but she inhaled through her nose and waited.
"Get out of my way," she hissed through her teeth.
"You don't want to talk about it with me, or with anyone?" Rowan asked seriously. His pine-green eyes were scanning her face, assessing her near-feral expression, and she idly noticed how long his dark eyelashes were. The question caught her off-guard, and the rage on her face smoothed out somewhat as she considered.
"You, maybe, or with – with anyone, I suppose." Celaena placed a hand on her hip and surveyed him. She did have Elide, but they hadn't talked about… this. About what Celaena suspected, with her aunt. "Are you going to move?"
Rowan turned to the side and Celaena breezed past him without another word. She didn't care about him. She didn't care about his stupid, piercing green eyes, or about that wicked tattoo winding its way up his neck. She had dropped her guard earlier, sinking into her music to escape, but her escapade tonight had only led her to feel more confused about everything that had happened.
Rowan could only think about that burning pain he had seen in her beautiful eyes, after she had whipped around to face him. Her eyes had flickered with hurt before she carefully smoothed out her expression. He watched her stalk away from him and didn't try to follow this time. He had a feeling she wouldn't let him go without a real fight next time.
She turned down several hallways and slipped down one of the stairwells to exit out of one of the building's backdoors. Celaena was annoyed that Rowan had followed her so easily in the first place, and she made sure he hadn't tailed her again.
She walked aimlessly for a while, before swiftly scaling a tree and tilting her face up at the moon. At least the moon was the same, no matter where she went or how lost she was.
103 notes · View notes
genais-world · 6 years
Text
Feature: A. Our wigs are made of 100% High Temperature Fiber. Natural, soft and comfortable just like human hair B. Superior workmanship. All our wigs are carefully handcrafted, designed fiber density makes the wig cap completely invisible, avoid any artificial apperance; Premium quality rose net, breathable and adjustable C. Wigs come in various shapes, lengths, colors, easily make it possible to change your hair style within minutes, of course no damage to your original hair D. We will try our best to provide the excellent products and after-sale service,pls feel free to contact us if you have any questions. Notice: 1. All items sold by us are being described to the best of our abilities, as accurate as possible, and with utmost conscientiousness on our part. But pls note size and color representation are vary from computer to computer due to monitor settings and may not be exact. Be sure to ask all questions PRIOR TO BIDDING. 2. Due to the flexibility of hair extension and manual measurement, please allow 2-3cm errors. 3. Please pay attention to the shipping! If you choose standard, it usually takes 7-15 days to USA by Epacket. If you want faster, you may choose Expedited, it usually takes 5-7 days to arrive. If you have any requests about specific delivery date, please let us know. We will try our best to help you. Please note that the Estimated Delivery is what the Amazon system shows, not the exact date the seller provides.
Your satisfaction and positive feedback is very important to us. Please leave positive feedback and Five Stars if you are satisfied with our items and services. Any questions, feel free to contact us. Thank you! Length: Approx 28cm/11″;Weight:140g±5g Material: High Temp Fiber (Can be ironed and restyled under 180 degree) 100% Breathable wig network makes you feel very very comfortable and natural It’s about 22-23 inch for head circumference, there is an elasticity button to adjust the size Package:1pc wig + 1pc hairnet [amz_corss_sell asin=”B01C2BO5HS”]
Miss U Hair Adult Short Wavy Brown Fluffy Hair Movie Cosplay Costume Wig for Men C302
Feature: A. Our wigs are made of 100% High Temperature Fiber. Natural, soft and comfortable just like human hair…
Miss U Hair Adult Short Wavy Brown Fluffy Hair Movie Cosplay Costume Wig for Men C302 Feature: A. Our wigs are made of 100% High Temperature Fiber. Natural, soft and comfortable just like human hair…
0 notes
liveonlinematches · 6 years
Link
New Arsenal head of recruitment Sven Mislintat has these days printed that he feels as despite the fact that he’s anticipated ‘to signal a Dembele in each and every switch window.’
Extremely-regarded
45-year-old Mislintat, nicknamed ‘Diamond Eye’, have been part of Dortmund’s setup for the previous decade, proving a key contributor to their reemergence as some of the dominant forces within the Bundesliga.
Mislintat oversaw the signings of all of Shinji Kagawa, who used to be if truth be told taking part in in his house nation of Japan when first noticed, Robert Lewandowski, who has since long past directly to change into some of the best strikers in international soccer, Pierre-Emerick Aubameyang, who has racked up 96 targets in 140 league outings for the membership, and Christian Pulisic, who’s extensively thought to be probably the most proficient starlets on the earth.
PL sure
Following a number of weeks of rumours linking the German with a transfer to Arsenal, each the Gunners and BVB showed the inside track that he had determined on making the transfer to North London closing month.
Mislintat will now start paintings along Arsene Wenger within the English capital, with ‘Diamond Eye’ admitting throughout an interview previous these days that he’s neatly acutely aware of the weighty expectancies on his shoulders:
‘Going by way of the clicking in England and Germany, they be expecting me to signal a Dembele in each and every switch window. I’m being placed on a surprisingly prime pedestal.’
‘My biggest appreciate’
Mislintat additionally mentioned fresh feedback from Borussia Dortmund CEO Hans-Joachim Watzke, who admitted that the membership had handled their head scout like ‘a leper’ throughout Thomas Tuchel’s time at the bench on the Westfalenstadion:
‘There have been many stuff in that point that I’d have most well-liked to do with out, and the similar is going for Thomas Tuchel too, more than likely. Finally it broken us all,’  Mislintat defined to Kicker.
‘I’m now not mad at any person, to the contrary, I in finding it extraordinarily courageous what Watzke mentioned on the club and shareholder assembly. To take accountability in a hard segment for the membership has my biggest appreciate.’
Arsenal and Tottenham eyeing transfer for Actual Madrid midfielder
Arsenal combat Everton for former Stoke and Blackburn celebrity
GAMBLING CAN BE ADDICTIVE, PLEASE PLAY RESPONSIBLY
!serve as(f,b,e,v,n,t,s)(window, report,’script’,’http://ift.tt/2A6yU1N;); fbq(‘init’, ‘1821170621460215’); // Insert your pixel ID right here. fbq(‘observe’, ‘PageView’); (serve as(d, s, identification) (report, ‘script’, ‘facebook-jssdk’));
http://ift.tt/2AOyRdK football
0 notes
Text
CMIT 321 Final Exam
CMIT 321 Final Exam
Click Link Below To Buy:
 http://hwaid.com/shop/cmit-321-final-exam/
 Written  2016  
Attempt Score:                121 / 125 - 96.8 %
Final Exam
Question 1                          1 / 1 point
__________ is the exploitation of an organization's telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources.
a. War driving
b. Line dialing
c. PBX driving
d. War dialing
View Feedback
Question 2                          1 / 1 point
__________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message.
a. Symmetric
b. Hash-based
c. Private-key
d. Public-key
View Feedback
Question 3                          1 / 1 point
__________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD.
a. Gnoppix
b. GeeXboX
c. Morphix
d. Damn Small Linux
View Feedback
Question 4                          1 / 1 point
The __________ utility tests the integrity of an ODBC data source.
a. odbcping
b. ASPRunner
c. FlexTracer
d. DbEncrypt
View Feedback
Question 5                          1 / 1 point
In the TCP/IP stack, the __________ layer is where applications and protocols, such as HTTP and Telnet, operate.
a. Internet
b. network
c. transport
d. application
View Feedback
Question 6                          1 / 1 point
Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password fields with __________.
a. a pound sign
b. two dashes
c. a single quotation mark
d. double quotes
View Feedback
Question 7                          1 / 1 point
__________ allow attackers to pass malicious code to different systems via a web application.
a. SQL injection attacks
b. XSS vulnerabilities
c. Authentication hijacking attacks
d. Command injection flaws
View Feedback
Question 8                          1 / 1 point
A __________ is a trusted entity that signs certificates and can vouch for the identity of the user and the user's public key.
a. verification authority
b. certification authority
c. validation authority
d. registration authority
View Feedback
Question 9                          1 / 1 point
Null sessions require access to TCP port __________.
a. 139
b. 141
c. 345
d. 349
View Feedback
Question 10                        1 / 1 point
__________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server.
a. ODBC
b. SQLP
c. OSQL
d. SSRS
View Feedback
Question 11                        1 / 1 point
The __________ file is used to determine which TTY devices the root user is allowed to log in to.
a. /usr/securetty
b. /etc/securetty
c. /var/securetty
d. /home/securetty
View Feedback
Question 12                        1 / 1 point
__________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it.
a. CheckOK
b. SMTPCheck
c. SMTPMon
d. SLCheck
View Feedback
Question 13                        1 / 1 point
__________ is a method of gaining access to sensitive data in a Bluetooth-enabled device.
a. Bluebugging
b. Bluesnarfing
c. BTKeylogging
d. Blueprinting
View Feedback
Question 14                        1 / 1 point
__________ is a simple form of attack aimed directly at the application's business logic.
a. Authentication hijacking
b. Parameter tampering
c. Cookie poisoning
d. Session poisoning
View Feedback
Question 15                        1 / 1 point
Once the Oracle database server has been traced, the first port of call is made to the __________ listener.
a. SQL
b. TNS
c. TCP
d. PL/SQL
View Feedback
Question 16                        1 / 1 point
__________ is a common and easy form of SQL injection. The technique involves evading the logon forms.
a. Command injection
b. SELECT bypass
c. INSERT injection
d. Authorization bypass
View Feedback
Question 17                        1 / 1 point
__________ gathering is the process of accumulating information from resources like the Internet that can later be analyzed as business intelligence.
a. Competitive intelligence
b. Tracerouting
c. Passive information
d. Footprinting
View Feedback
Question 18                        1 / 1 point
__________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned third-party applications on the iPhone.
a. iFuntastic
b. iNdependence
c. iActivator
d. AppSnapp
View Feedback
Question 19                        1 / 1 point
Firefox 2.0.0.11 cannot correctly interpret single quotation marks and spaces during authentication. This is called the __________ value of an authentication header.
a. registration
b. site
c. domain
d. realm
View Feedback
Question 20                        1 / 1 point
Private data stored by Firefox can be quickly deleted by selecting __________ in the Tools menu.
a. Clear History
b. Clear Private Data
c. Delete Private Data
d. Delete History
View Feedback
Question 21                        1 / 1 point
A(n) __________ is a custom command in Linux that is a substitute for a formal command string.
a. user string
b. system link
c. alias
d. link
View Feedback
Question 22                        1 / 1 point
A __________ is a device that cannot function in any capacity.
a. block
b. brick
c. rock
d. cage
View Feedback
Question 23                        0 / 1 point
__________ involves plotting the tables in the database.
a. Database enumeration
b. Database footprinting
c. Table footprinting
d. Table enumeration
View Feedback
Question 24                        1 / 1 point
A __________ is a device that receives digital signals and converts them into analog signals, and vice versa.
a. firewall
b. proxy
c. hub
d. modem
View Feedback
Question 25                        1 / 1 point
Which of the following types of tools would be most effective in cracking UNIX passwords?
a. Ophcrack
b. KerbCrack
c. John the Ripper
d. RainbowCrack
View Feedback
Question 26                        1 / 1 point
SQL Server, like other databases, delimits queries with a __________.
a. colon
b. period
c. semicolon
d. comma
View Feedback
Question 27                        1 / 1 point
__________ is a unique 15- or 17-digit code used to identify a mobile station to a GSM network.
a. IMEI
b. SIMID
c. SIM
d. PhoneID
View Feedback
Question 28                        1 / 1 point
Which of the following password attacks is conducted using nontechnical means?
a. hybrid
b. brute force
c. social engineering
d. rainbow tables
View Feedback
Question 29                        1 / 1 point
In __________-level hijacking, the attacker obtains the session IDs to get control of an existing session or to create a new, unauthorized session.
a. network
b. data link
c. transport
d. application
View Feedback
Question 30                        1 / 1 point
Which of the tools listed below can be used to execute code on remote Windows systems?
a. X.exe
b. PsExec
c. Rsync
d. Ghost
View Feedback
Question 31                        1 / 1 point
Kaspersky is used as __________.
a. a hacking tool against PDAs
b. a hacking tool against IPHONEs
c. a hacking tool against IPODs
d. an antivirus for Windows Mobile
View Feedback
Question 32                        1 / 1 point
__________ viruses search all drives and connected network shares to locate files with an EXE or SCR extension.
a. W32/Madang-Fam
b. W32/Hasnot-A
c. W32/Fujacks-AK
d. W32/Fujacks-E
View Feedback
Question 33                        1 / 1 point
What is the difference between online and offline password attacks?
a. Online attacks are conducted against people using the Internet, and offline attacks are conducted against people on private networks.
b. Online attacks target passwords or their representations as they traverse a network, and offline attacks focus on stored passwords.
c. Online attacks are used to gain access to systems, and offline attacks are used to knock systems off the network.
d. Offline attacks target passwords or their representations as they traverse a network, and online attacks focus on stored passwords.
View Feedback
Question 34                        0 / 1 point
__________ synchronizes the information between a Palm device and a desktop PC.
a. HotSync
b. ActiveSync
c. PocketSync
d. PalmSync
View Feedback
Question 35                        1 / 1 point
__________ is a type of computer architecture in which multiple processors share the same memory and are each assigned different tasks to perform.
a. Xcode
b. Multitasking
c. Cocoa
d. Symmetric multiprocessing
View Feedback
Question 36                        1 / 1 point
__________ hackers are information security professionals who specialize in evaluating, and defending against, threats from attackers.
a. Gray-hat
b. Black-hat
c. Consulting
d. Ethical
View Feedback
Question 37                        1 / 1 point
An __________ share is a hidden share that allows communication between two processes on the same system.
a. SMC
b. IPC
c. EPC
d. SMB
View Feedback
Question 38                        1 / 1 point
The __________ method appends data in the URL field.
a. POST
b. GET
c. APPEND
d. URL
View Feedback
Question 39                        1 / 1 point
__________ is a lightweight substitute for telnet that enables the execution of processes on other systems, eliminating the need for manual installation of client software.
a. PsExec
b. Alchemy Remote Executor
c. Emsa FlexInfo Pro
d. RemoteApp
View Feedback
Question 40                        1 / 1 point
__________ is a back-end GPL tool that works directly with any RFID ISO-reader to make the content stored on the RFID tags accessible.
a. RFDump
b. RFReader
c. RFReceiver
d. RFExplorer
View Feedback
Question 41                        1 / 1 point
__________ is a parallelized login cracker that supports numerous protocols for attack.
a. ADMsnmp
b. SING
c. Hydra
d. John the Ripper
View Feedback
Question 42                        1 / 1 point
IT __________ are designed to evaluate an organization's security policies and procedures.
a. ping sweeps
b. vulnerability assessments
c. penetration tests
d. security audits
View Feedback
Question 43                        1 / 1 point
__________ is the act of gathering information about the security profile of a computer system or organization, undertaken in a methodological manner.
a. Tracerouting
b. Passive information gathering
c. Footprinting
d. Competitive intelligence gathering
View Feedback
Question 44                        1 / 1 point
__________ is a command-line interface for Microsoft SQL Server that allows an attacker to execute commands on the underlying operating system, execute SQL queries, and upload files to a remote server.
a. SQLExec
b. Absinthe
c. Sqlninja
d. SQLSmack
View Feedback
Question 45                        1 / 1 point
__________ occurs when hackers break into government or corporate computer systems as an act of protest.
a. Hacktivism
b. Cyber terrorism
c. Cybercrime
d. Suicide hacking
View Feedback
Question 46                        1 / 1 point
Mac OS X includes __________, a collection of frameworks, APIs, and accompanying runtimes that allows for a host of open-source web, database, scripting, and development technologies.
a. Cocoa
b. Coffee
c. Bean
d. Xcode
View Feedback
Question 47                        1 / 1 point
__________ is usually employed when the attacker discerns that there is a low probability that these reconnaissance activities will be detected.
a. Social engineering
b. Direct information gathering
c. Active reconnaissance
d. Inactive reconnaissance
View Feedback
Question 48                        1 / 1 point
__________ is a programming language that permits website designers to run applications on the user's computer.
a. Java
b. Ruby
c. Python
d. Smalltalk
View Feedback
Question 49                        1 / 1 point
_________ hijacking is a hacking technique that uses spoofed packets to take over a connection between a victim and a target machine.
a. ACK
b. Blind
c. TCP/IP
d. Network-level
View Feedback
Question 50                        1 / 1 point
In order for traffic to get back to the attacker during session hijacking, a process called __________ is used that allows the sender to specify a particular route for the IP packet to take to the destination.
a. desynchronization
b. source routing
c. spoofing
d. TCP routing
View Feedback
Question 51                        1 / 1 point
__________ is a worm for Windows XP that downloads and executes malicious files on the compromised computer and spreads through removable storage devices.
a. HTTP W32.Drom
b. W32/VBAut-B
c. W32/QQRob-ADN
d. W32/SillyFDC-BK
View Feedback
Question 52                        1 / 1 point
The Java-based __________ worm spreads through Bluetooth and affects unprotected Mac OS X 10.4 systems.
a. OSX/Leap-A
b. AppHook.B
c. Inqtana.A
d. BTHook-A
View Feedback
Question 53                        1 / 1 point
__________ is a virus targeted against mobile personal digital assistant devices.
a. Skulls
b. Brador
c. Doomboot.A
d. Podloso
View Feedback
Question 54                        1 / 1 point
The __________ stores confidential information that is accessible only from inside the organization.
a. public website
b. confidential website
c. private website
d. external website
View Feedback
Question 55                        1 / 1 point
__________ is the unauthorized alteration of routing tables.
a. Route poisoning
b. Routing table spoofing
c. Routing table poisoning
d. Route spoofing
View Feedback
Question 56                        1 / 1 point
__________ automatically scans a computer, looking for cookies created by Internet Explorer, Mozilla Firefox, and Netscape Navigator, and then displays the data stored in each one.
a. Cookie Viewer
b. Cookie Explorer
c. Cookie Browser
d. Cookie Manager
View Feedback
Question 57                        1 / 1 point
__________ is a tool that administrators can use to test the reliability of their critical systems and determine what actions they must take to fix any problems.
a. DbEncrypt
b. AppDetective
c. Selective Audit
d. AppRadar
View Feedback
Question 58                        1 / 1 point
The __________ script allows a remote user to view the code of server-side scripts.
a. Showlogin.asp
b. Showcode.asp
c. RemoteAccess.asp
d. Remotelogin.asp
View Feedback
Question 59                        1 / 1 point
__________ is a method in which a sniffer is used to track down a conversation between two users.
a. A man-in-the-middle (MITM) attack
b. Session hijacking
c. IP spoofing
d. Network tapping
View Feedback
Question 60                        1 / 1 point
__________ is a small utility that lists all USB devices currently connected to a computer, as well as all previously used USB devices.
a. MyUSBOnly
b. USB Blocker
c. USB CopyNotify!
d. USBDeview
View Feedback
Question 61                        1 / 1 point
After gaining access, what is the attacker's next goal?
a. Cover their tracks.
b. Start denial-of-service attacks.
c. Find ways to maintain access.
d. None of the above.
View Feedback
Question 62                        1 / 1 point
__________ is an HTTP authentication brute-force program. It attempts to guess passwords for basic HTTP authentication by logging in to a web server.
a. Authforce
b. ObiWaN
c. Hydra
d. Cain & Abel
View Feedback
Question 63                        1 / 1 point
__________ record the parts of the website visited and can contain identifying information.
a. Logs
b. Records
c. Cookies
d. Certificates
View Feedback
Question 64                        1 / 1 point
Web applications have a three-layered architecture consisting of presentation, logic, and __________.
a. application
b. data layers
c. transport
d. HTTP
View Feedback
Question 65                        1 / 1 point
__________ is a Linux security feature that enables a user to choose the directory that an application can access.
a. Chroot
b. Sandbox
c. Jailroot
d. Rootjail
View Feedback
Question 66                        1 / 1 point
There are several aspects to security, and the owner of a system should have confidence that the system will behave according to its specifications. This is called __________.
a. confidentiality
b. reusability
c. accountability
d. assurance
View Feedback
Question 67                        1 / 1 point
The __________ command displays the ARP table and is used to modify it.
a. ifconfig -arp
b. arp-table
c. netstat -arp
d. arp
View Feedback
Question 68                        0 / 1 point
__________ detects and monitors Bluetooth devices in a wireless network. It provides information about the features of each device and the services provided by it.
a. Bluetooth Network Scanner
b. BlueFire Mobile Security
c. BlueAuditor
d. BlueWatch
View Feedback
Question 69                        1 / 1 point
Which of the following statements best describes a penetration test?
a. A penetration test is using a password cracker to gain access to a system.
b. A penetration test is an attempt to simulate methods used by attackers to gain unauthorized access to a computer system.
c. A penetration test is the act of hacking computer systems; it is used by criminals to attack legitimate organizations.
d. A penetration test is an audit of an organization's security policies and procedures.
View Feedback
Question 70                        1 / 1 point
Which website can an ethical hacker visit to see web pages from 2002?
a. www.symantec.com
b. www.archive.org
c. www.oldwebsites.net
d. www.historyoftheinternet.com
View Feedback
Question 71                        1 / 1 point
__________ provides a complete view for monitoring and analyzing activity within USB host controllers, USB hubs, and USB devices.
a. USB PC Lock
b. USBlyzer
c. Advanced USB Monitor
d. Virus Chaser USB
View Feedback
Question 72                        1 / 1 point
The __________ is due to a canonicalization error in IIS 4.0 and 5.0 that allows an attacker to use malformed URLs to access files and folders located on the logical drive that includes web folders.
a. canonicalization vulnerability
b. ::$DATA vulnerability
c. Unicode directory traversal vulnerability
d. Msw3prt IPP vulnerability
View Feedback
Question 73                        1 / 1 point
A __________ attack adds numbers or symbols to a dictionary file's contents to crack a password successfully.
a. brute-force
b. dictionary
c. hybrid
d. parameter manipulation
View Feedback
Question 74                        1 / 1 point
Only __________ scan is valid while scanning a Windows system.
a. SYN
b. Null
c. FIN
d. Xmas
View Feedback
Question 75                        1 / 1 point
Ethical hackers use their knowledge and skills to __________.
a. learn the details of computer systems and enhance their capabilities
b. attack government and commercial businesses
c. develop new programs or reverse-engineer existing software to make it more efficient
d. defend networks from malicious attackers
View Feedback
Question 76                        1 / 1 point
Tripwire protects against Trojan horse attacks by __________.
a. blocking the port that the Trojan program is listening on
b. removing any Trojan horse programs found on the system
c. detecting unexpected changes to a system utility file that may indicate it had been replaced by a Trojan horse
d. quarantining any Trojan horse programs discovered on the system
View Feedback
Question 77                        1 / 1 point
The ISAPI extension responsible for IPP is __________.
a. msisapi.dll
b. msw3prt.dll
c. msipp5i.dll
d. isapiipp.dll
View Feedback
Question 78                        1 / 1 point
__________ is a protocol used to create, modify, and terminate sessions such as VOIP.
a. SMS
b. SIP
c. GSMA
d. GPRS
View Feedback
Question 79                        1 / 1 point
A(n) __________ is a specific way to breach the security of an IT system through a vulnerability.
a. hole
b. exposure
c. exploit
d. threat
View Feedback
Question 80                        1 / 1 point
__________ is a portable, battery-powered device that mediates interactions between RFID readers and RFID tags.
a. RSA blocker tag
b. RFID Firewall
c. RFID Guardian
d. Kill switch
View Feedback
Question 81                        1 / 1 point
Which of the statements below correctly describes a dictionary attack against passwords?
a. It is an attack that tries every combination of characters until a correct password is identified.
b. It is an attack that uses a list of words to guess passwords until a correct password is identified.
c. It is an attack that uses a list of words and appends additional numbers or characters to each word until a correct password is identified.
d. It is an attack that uses precomputed values until a correct password is identified.
View Feedback
Question 82                        0 / 1 point
The __________ are the agreed-on guidelines for a penetration test.
a. rules of engagement
b. project scope statements
c. test requirements
d. service-level agreements (SLAs)
View Feedback
Question 83                        1 / 1 point
The Network News Transport Protocol service uses port __________.
a. 110
b. 119
c. 135
d. 139
View Feedback
Question 84                        1 / 1 point
A(n) __________ is the logical, not physical, component of a TCP connection.
a. ISN
b. socket
c. port
d. SYN
View Feedback
Question 85                        1 / 1 point
__________ reconnaissance is a hacker's attempt to scout for or survey potential targets and then investigate the target using publicly available information.
a. Active
b. Passive
c. Public
d. Open
View Feedback
Question 86                        1 / 1 point
A __________, also called a packet analyzer, is a software program that can capture, log, and analyze protocol traffic over the network and decode its contents.
a. sniffer
b. recorder
c. logger
d. tapper
View Feedback
Question 87                        1 / 1 point
__________ is, simply enough, looking through an organization's trash for any discarded sensitive information.
a. Trash diving
b. Trash carving
c. Dumpster searching
d. Dumpster diving
View Feedback
Question 88                        1 / 1 point
__________ is a secure method of posting data to the database.
a. URL
b. SQL
c. GET
d. POST
View Feedback
Question 89                        1 / 1 point
How do you defend against privilege escalation?
a. Use encryption to protect sensitive data.
b. Restrict the interactive logon privileges.
c. Run services as unprivileged accounts.
d. Run users and applications on the least privileges.
View Feedback
Question 90                        1 / 1 point
When an ethical hacker uses nslookup, which protocol are they querying?
a. DNS
b. HTTPS
c. SMB
d. NTP
View Feedback
Question 91                        1 / 1 point
Bluetooth-enabled devices communicate via short-range, ad hoc networks known as __________.
a. piconets
b. uninets
c. btnets
d. pans
View Feedback
Question 92                        1 / 1 point
The act of hiding data within or behind other data is known as __________.
a. encoding
b. encryption
c. steganography
d. fuzzing
View Feedback
Question 93                        1 / 1 point
A __________ occurs when a connection between the target and host is in the established state, or in a stable state with no data transmission, or the server's sequence number is not equal to the client's acknowledgment number, or the client's sequence number is not equal to the server's acknowledgment number.
a. synchronization state
b. blind hijacking
c. source routing
d. desynchronization state
View Feedback
Question 94                        1 / 1 point
__________ are software applications that run automated tasks over the Internet.
a. Zombies
b. Spiders
c. Bots
d. Crawlers
View Feedback
Question 95                        1 / 1 point
Which of the following definitions best describes a wrapper?
a. A wrapper is a packet-crafting technique used to perform stealthy port scans.
b. A wrapper is an encryption tool used to hide messages inside image files.
c. A wrapper is a method of hiding a virus inside an executable file.
d. A wrapper is a tool used to bind a Trojan to a legitimate file.
View Feedback
Question 96                        1 / 1 point
In a hit-and-run attack, __________.
a. the attacker constantly injects bad packets into the router
b. the attacker mistreats packets, resulting in traffic congestion
c. the attacker injects a few bad packets into the router
d. the attacker alters a single packet, resulting in denial of service
View Feedback
Question 97                        1 / 1 point
__________ is a command-line TCP/IP packet assembler/analyzer.
a. Hping2
b. Firewalk
c. WUPS
d. Blaster Scan
View Feedback
Question 98                        1 / 1 point
The __________ tool traces various application calls from Windows API functions to the Oracle Call Interface.
a. ASPRunner
b. FlexTracer
c. odbcping
d. SQL Query Analyzer
View Feedback
Question 99                        1 / 1 point
With the __________ tool, you can ping multiple IP addresses simultaneously.
a. Fping
b. Nmap
c. Nessus
d. Unicornscan
View Feedback
Question 100                     1 / 1 point
Attackers use a technique called __________ to exploit the system by pretending to be legitimate users or different systems.
a. identity theft
b. impersonation
c. spoofing
d. flooding
View Feedback
Question 101                     1 / 1 point
__________ is a Microsoft-proprietary protocol that authenticates users and computers based on an authentication challenge and response.
a. LMLAN
b. Kerberos
c. NTLM
d. NTLAN
View Feedback
Question 102                     1 / 1 point
__________ reconstructs a device's Bluetooth PIN and link key from data sniffed during a pairing session.
a. Blooover
b. Hidattack
c. BTCrack
d. Cabir and Mabir
View Feedback
Question 103                     1 / 1 point
This type of port scanning technique splits a TCP header into several packets so that the packet filters cannot detect what the packets intend to do.
a. UDP scanning
b. IP fragment scanning
c. inverse TCP flag scanning
d. ACK flag scanning
View Feedback
Question 104                     1 / 1 point
__________ is an application that, when installed on a system, runs a background process that silently copies files from any USB flash drive connected to it.
a. USB Switchblade
b. USBDumper
c. USB Hacksaw
d. USB Copy 'em all
View Feedback
Question 105                     1 / 1 point
__________ is an application that identifies all Bluetooth-enabled devices, their communications, and their connectivity within a given area.
a. BlueSweep
b. BlueWatch
c. BlueKey
d. BlueFire Mobile
View Feedback
Question 106                     1 / 1 point
__________ URLs, or intranets, are private links that only a company's employees use.
a. Internal
b. Private
c. Organizational
d. Domain
View Feedback
Question 107                     1 / 1 point
In Internet Explorer, the __________ zone is a security zone for sites that the user has designated as safe to visit.
a. user sites
b. legal sites
c. white list
d. trusted sites
View Feedback
Question 108                     1 / 1 point
Which of the following is not a category of security assessment?
a. security audit
b. rootkit detection
c. vulnerability assessment
d. penetration testing
View Feedback
Question 109                     1 / 1 point
A hacker has successfully used a tool to intercept communications between two entities and establish credentials with both sides of the connection. The two remote ends of the communication never notice that the attacker is relaying the information between the two. This is called a(n) __________ attack.
a. man-in-the-middle
b. interceptoring
c. MAC poisoning attack
d. firewalking
View Feedback
Question 110                     1 / 1 point
__________ is a cable modem hacking program. It performs the task of uncapping by incorporating all the uncapping steps into one program.
a. Yersinia
b. OneStep: ZUP
c. Zebra
d. Solar Winds MIB Browser
View Feedback
Question 111                     1 / 1 point
Information on all Linux accounts is stored in the __________ and /etc/shadow files.
a. /etc/conf
b. /etc/passwd
c. /etc/password
d. /conf/passwd
View Feedback
Question 112                     1 / 1 point
Which type of penetration test is conducted with absolutely no prior knowledge of the target environment?
a. white-box testing
b. gray-box testing
c. red-hat testing
d. black-box testing
View Feedback
Question 113                     1 / 1 point
Redirections for URLs are handled with the __________ URL handler, which can cause errors in older versions of Internet Explorer.
a. goto:
b. mdir:
c. mhtml:
d. redir:
View Feedback
Question 114                     1 / 1 point
Traceroute uses the __________ field in an IP packet to determine how long it takes to reach a target host and whether that host is reachable and active.
a. IHL
b. flags
c. TOS
d. TTL
View Feedback
Question 115                     1 / 1 point
Which of the following is not a Microsoft Internet Information Services vulnerability?
a. ::$DATA vulnerability
b. UFS integer overflow vulnerability
c. Showcode.asp vulnerability
d. WebDAV/RPC exploits
View Feedback
Question 116                     1 / 1 point
Which of the following statements best describes the rules of engagement for a penetration test?
a. The rules of engagement are the systems that a tester can knock offline during a penetration test.
b. The rules of engagement are the agreed-upon guidelines for a penetration test, including desired code of conduct and procedures.
c. The rules of engagement define the service-level agreement and scope of a penetration test.
d. The rules of engagement include the insurance and risk management associated with third-party testing.
View Feedback
Question 117                     1 / 1 point
The __________ service is responsible for sending a response packet that contains connection details to clients who send a specially formed request.
a. SSRS
b. OSQL
c. ODBC
d. SQLP
View Feedback
Question 118                     1 / 1 point
The RFID __________ policy establishes the framework for many other security controls. It provides a vehicle for management to communicate its expectations regarding the RFID system and its security.
a. security
b. physical access
c. secure disposal
d. usage
View Feedback
Question 119                     1 / 1 point
A __________ is a set of related programs, usually located at a network gateway server, that protect the resources of a private network from other network users.
a. firewall
b. proxy
c. packet filter
d. router
View Feedback
Question 120                     1 / 1 point
While conducting an ethical penetration test in Europe, which Regional Internet Registry (RIR) would you use?
a. APNIC
b. RIPE NCC
c. ARIN
d. LACNIR
View Feedback
Question 121                     1 / 1 point
__________ is a tool for performing automated attacks against web-enabled applications.
a. cURL
b. dotDefender
c. Burp Intruder
d. AppScan
View Feedback
Question 122                     1 / 1 point
If the supplied data does not fit within the size constraints of a single packet, the data is spread among multiple packets in a process known as __________.
a. framing
b. separation
c. fragmentation
d. division
View Feedback
Question 123                     1 / 1 point
__________ is a nonvoice service available with most GSM networks.
a. CDMA
b. EDO
c. EDVA
d. GPRS
View Feedback
Question 124                     1 / 1 point
The information resource or asset that is being protected from attacks is usually called the __________.
a. key value
b. target of evaluation
c. main asset
d. target asset
View Feedback
Question 125                     1 / 1 point
__________ is an information service provider that helps law offices, government agencies, businesses, and individuals find information about people.
a. People-Search-America.com
b. Best People Search
c. Switchboard
d. Google Finance
View Feedback
________________________________________
Attempt Score: 121 / 125 - 96.8 %
Overall Grade (highest attempt):              121 / 125 - 96.8 %
1 note · View note
genais-world · 6 years
Text
Feature: A. Our wigs are made of 100% High Temperature Fiber. Natural, soft and comfortable just like human hair B. Superior workmanship. All our wigs are carefully handcrafted, designed fiber density makes the wig cap completely invisible, avoid any artificial apperance; Premium quality rose net, breathable and adjustable C. Wigs come in various shapes, lengths, colors, easily make it possible to change your hair style within minutes, of course no damage to your original hair D. We will try our best to provide the excellent products and after-sale service,pls feel free to contact us if you have any questions. Notice: 1. All items sold by us are being described to the best of our abilities, as accurate as possible, and with utmost conscientiousness on our part. But pls note size and color representation are vary from computer to computer due to monitor settings and may not be exact. Be sure to ask all questions PRIOR TO BIDDING. 2. Due to the flexibility of hair extension and manual measurement, please allow 2-3cm errors. 3. Please pay attention to the shipping! If you choose standard, it usually takes 7-15 days to USA by Epacket. If you want faster, you may choose Expedited, it usually takes 5-7 days to arrive. If you have any requests about specific delivery date, please let us know. We will try our best to help you. Please note that the Estimated Delivery is what the Amazon system shows, not the exact date the seller provides.
Your satisfaction and positive feedback is very important to us. Please leave positive feedback and Five Stars if you are satisfied with our items and services. Any questions, feel free to contact us. Thank you! Length: Approx 28cm/11″;Weight:140g±5g Material: High Temp Fiber (Can be ironed and restyled under 180 degree) 100% Breathable wig network makes you feel very very comfortable and natural It’s about 22-23 inch for head circumference, there is an elasticity button to adjust the size Package:1pc wig + 1pc hairnet [amz_corss_sell asin=”B01C2BO5HS”]
Miss U Hair Adult Short Wavy Brown Fluffy Hair Movie Cosplay Costume Wig for Men C302 Feature: A. Our wigs are made of 100% High Temperature Fiber. Natural, soft and comfortable just like human hair…
0 notes
genais-world · 6 years
Text
Feature: A. Our wigs are made of 100% High Temperature Fiber. Natural, soft and comfortable just like human hair B. Superior workmanship. All our wigs are carefully handcrafted, designed fiber density makes the wig cap completely invisible, avoid any artificial apperance; Premium quality rose net, breathable and adjustable C. Wigs come in various shapes, lengths, colors, easily make it possible to change your hair style within minutes, of course no damage to your original hair D. We will try our best to provide the excellent products and after-sale service,pls feel free to contact us if you have any questions. Notice: 1. All items sold by us are being described to the best of our abilities, as accurate as possible, and with utmost conscientiousness on our part. But pls note size and color representation are vary from computer to computer due to monitor settings and may not be exact. Be sure to ask all questions PRIOR TO BIDDING. 2. Due to the flexibility of hair extension and manual measurement, please allow 2-3cm errors. 3. Please pay attention to the shipping! If you choose standard, it usually takes 7-15 days to USA by Epacket. If you want faster, you may choose Expedited, it usually takes 5-7 days to arrive. If you have any requests about specific delivery date, please let us know. We will try our best to help you. Please note that the Estimated Delivery is what the Amazon system shows, not the exact date the seller provides.
Your satisfaction and positive feedback is very important to us. Please leave positive feedback and Five Stars if you are satisfied with our items and services. Any questions, feel free to contact us. Thank you! Length: Approx 28cm/11″;Weight:150g±5g Material: High Temp Fiber (Can be ironed and restyled under 180 degree) 100% Breathable wig network makes you feel very very comfortable and natural It’s about 22-23 inch for head circumference, there is an elasticity button to adjust the size Package:1pc wig + 1pc hairnet [amz_corss_sell asin=”B01C2BG3W8″]
Miss U Hair Men’s Short Wavy Silver Grey Color Agedness Movie Cosplay Wig C301
Feature: A. Our wigs are made of 100% High Temperature Fiber. Natural, soft and comfortable just like human hair…
Miss U Hair Men’s Short Wavy Silver Grey Color Agedness Movie Cosplay Wig C301 Feature: A. Our wigs are made of 100% High Temperature Fiber. Natural, soft and comfortable just like human hair…
0 notes
genais-world · 6 years
Text
Feature: A. Our wigs are made of 100% High Temperature Fiber. Natural, soft and comfortable just like human hair B. Superior workmanship. All our wigs are carefully handcrafted, designed fiber density makes the wig cap completely invisible, avoid any artificial apperance; Premium quality rose net, breathable and adjustable C. Wigs come in various shapes, lengths, colors, easily make it possible to change your hair style within minutes, of course no damage to your original hair D. We will try our best to provide the excellent products and after-sale service,pls feel free to contact us if you have any questions. Notice: 1. All items sold by us are being described to the best of our abilities, as accurate as possible, and with utmost conscientiousness on our part. But pls note size and color representation are vary from computer to computer due to monitor settings and may not be exact. Be sure to ask all questions PRIOR TO BIDDING. 2. Due to the flexibility of hair extension and manual measurement, please allow 2-3cm errors. 3. Please pay attention to the shipping! If you choose standard, it usually takes 7-15 days to USA by Epacket. If you want faster, you may choose Expedited, it usually takes 5-7 days to arrive. If you have any requests about specific delivery date, please let us know. We will try our best to help you. Please note that the Estimated Delivery is what the Amazon system shows, not the exact date the seller provides.
Your satisfaction and positive feedback is very important to us. Please leave positive feedback and Five Stars if you are satisfied with our items and services. Any questions, feel free to contact us. Thank you! Length: Approx 28cm/11″;Weight:150g±5g Material: High Temp Fiber (Can be ironed and restyled under 180 degree) 100% Breathable wig network makes you feel very very comfortable and natural It’s about 22-23 inch for head circumference, there is an elasticity button to adjust the size Package:1pc wig + 1pc hairnet [amz_corss_sell asin=”B01C2BG3W8″]
Miss U Hair Men’s Short Wavy Silver Grey Color Agedness Movie Cosplay Wig C301 Feature: A. Our wigs are made of 100% High Temperature Fiber. Natural, soft and comfortable just like human hair…
0 notes
liveonlinematches · 6 years
Link
Manchester Town 2 – West Ham 1
Manchester Town made it 13 Premier League wins at the leap on Sunday afternoon.
Pep Guardiola’s facet had been anticipated to attain a hatful of targets in opposition to West Ham however finally needed to accept a 2-1 win.
Angelo Ogbonna headed West Ham in entrance simply ahead of half-time. Manchester Town, like closing week at Huddersfield, became the sport round in the second one 1/2.
Nicolas Otamendi lowered the arrears. Ahead of David Silva discovered a super winner, from but some other Kevin De Bruyne help, for 2-1 Manchester Town.
Subsequent up for Manchester Town: The small topic of the Manchester derby at Previous Trafford subsequent Sunday!
Pep Guardiola on Paul Pogba’s absence
After the win over West Ham, Pep Guardiola spoke at period all the way through his press convention about how Manchester Town can smash groups that take a seat again and protect their very own field.
After round 4 mins, Guardiola was once requested about Pogba’s fresh feedback relating to Manchester Town avid gamers and the French midfielder’s absence for subsequent Sunday’s Premier League tournament.
Pogba was once despatched off at Arsenal the day gone by and can serve a three-match ban that incorporates Town (h), Bournemouth (h) and West Brom (a).
Stylish Pep Guardiola
Pep Guardiola was once magnificence personified in discussing Paul Pogba.
First off, the Manchester Town supervisor refused to consider that Pogba hopes for any avid gamers to get injured.
On Pogba’s absence for arguably crucial Manchester derby ever, Pep stated: “I’d like Paul (Pogba) to play in opposition to us (subsequent weekend) as a result of I love to stand groups with their perfect avid gamers imaginable.”
Afterward within the press convention, Pep Guardiola mentioned the type of Sergio Aguero and hinted that he will have to play two up entrance at Manchester United subsequent week.
Pep Guardiola press convention after Guy Town 2 – West Ham 1
Similar: Guy Town equivalent exceptional PL file held via Arsenal & Chelsea.
Guy United fanatics react to some other Guy Town comeback victory.
!serve as(f,b,e,v,n,t,s)(window, file,’script’,’http://ift.tt/2B7CqrW;); fbq(‘init’, ‘1821170621460215’); // Insert your pixel ID right here. fbq(‘observe’, ‘PageView’); (serve as(d, s, identification) (file, ‘script’, ‘facebook-jssdk’));
http://ift.tt/2iefpwl football
0 notes