Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

John works as a professional Ethical Hacker. He has been assigned the task of testing the security of www.we-are-secure.com. He has performed the footprinting step and now he has enough information to begin scanning in order to detect active computers. He sends a ping request to a computer using ICMP type 13. What kind of ICMP message is John using to send the ICMP ping request message?

A.

Address mask request

B.

Echo request

C.

Information request (obsolete)

D.

Timestamp request (obsolete)

Which of the following is described in the following statement?

"It is a 512 bytes long boot sector that is the first sector of a default boot drive. It is also known as Volume Boot Sector, if the boot drive is un-partitioned. "

A.

BIOS

B.

SBR

C.

POST

D.

MBR

Which of the following statements are true about routers?

Each correct answer represents a complete solution. Choose all that apply.

A.

Routers organize addresses into classes, which are used to determine how to move packets from one network to another.

B.

Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.

C.

Routers do not limit physical broadcast traffic.

D.

Routers act as protocol translators and bind dissimilar networks.

Which of the following statements is NOT true about the file slack spaces in Windows operating system?

A.

File slack may contain data from the memory of the system.

B.

Large cluster size will decrease the volume of the file slack.

C.

File slack is the space, which exists between the end of the file and the end of the last cluster.

D.

It is possible to find user names, passwords, and other important information in slack.

Which of the following is used to authenticate asymmetric keys?

A.

Password

B.

Digital signature

C.

MAC Address

D.

Demilitarized zone (DMZ)

Which of the following tools is used to restore deleted files from Linux and Mac OS X file system?

A.

Easy-Undelete

B.

Active@ UNERASER

C.

Active@ UNDELETE

D.

R-Undelete

Trinity wants to send an email to her friend. She uses the MD5 generator to calculate cryptographic hash of her email to ensure the security and integrity of the email. MD5 generator, which Trinity is using operates in two steps:

Creates check file

Verifies the check file

Which of the following MD5 generators is Trinity using?

A.

MD5 Checksum Verifier

B.

Mat-MD5

C.

Chaos MD5

D.

Secure Hash Signature Generator

What is the name of the group of blocks which contains information used by the operating system in Linux system?

A.

logblock

B.

Systemblock

C.

Bootblock

D.

Superblock

Adam works as a Security Analyst for Umbrella Inc. He suspects that a virus exists in the network of the company. He scanned the client system with latest signature-based anti-virus, but no productive results have been obtained. Adam suspects that a polymorphic virus exists in the network. Which of the following statements are true about the polymorphic virus?

Each correct answer represents a complete solution. Choose all that apply.

A.

When the user runs the infected file in the disk, it loads virus into the RAM.

B.

The mutation engine of polymorphic virus generates a new encrypted code, this changes the signature of the virus.

C.

It has the ability to mutate and can change its known viral signature and hide from signature based antivirus programs.

D.

The new virus resides in the main memory of the computer and does not infect other files of the operating system.

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?

Each correct answer represents a complete solution. Choose all that apply.

A.

Hidden partition

B.

Slack space

C.

Dumb space

D.

Unused Sectors