Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following files in LILO booting process of Linux operating system stores the location of Kernel on the hard drive?

A.

/boot/map

B.

/boot/boot.b

C.

/etc/lilo.conf

D.

/sbin/lilo

You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to print the super block and block the group information for the filesystem present on a system.

Which of the following Unix commands can you use to accomplish the task?

A.

e2fsck

B.

dump

C.

e2label

D.

dumpe2fs

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

A.

Reconnaissance

B.

gaining access

C.

Scanning

D.

Preparation

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

SARA

B.

Snort

C.

Tripwire

D.

Samhain

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

A.

Fpipe

B.

PsList

C.

Cain

D.

PsExec

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

A.

Galleta

B.

FTK Imager

C.

FAU

D.

Device Seizure

Which of the following Linux file systems is a journaled file system?

A.

ext3

B.

ext4

C.

ext2

D.

ext

You work as a Network Administrator for McNeel Inc. You want to encrypt each user's MY DOCUMENTS folder. You decide to use Encrypting File System (EFS). You plan to write a script for encryption. Which of the following tools will you use to encrypt specified folders?

A.

EFSINFO

B.

SYSKEY

C.

CIPHER

D.

Windows Explorer

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He enters the following command on the Linux terminal:

chmod -rwSr----- secure.c

Considering the above scenario, which of the following statements is true?

A.

The Sticky bit is set, but other users have no execute permission.

B.

The SUID bit is set, but the owner has no execute permission.

C.

The Sticky bit is set and other users have the execute permission.

D.

The SGID bit is set, but the group execute permission is not set.

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He enters a single quote in the input field of the login page of the We-are-secure Web site and receives the following error message:

Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'

This error message shows that the We-are-secure Website is vulnerable to __________.

A.

An XSS attack

B.

A SQL injection attack

C.

A Denial-of-Service attack

D.

A buffer overflow