Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following can provide security against man-in-the-middle attack?

A.

Anti-virus programs

B.

Strong data encryption during travel

C.

Strong authentication method

D.

Firewall

Which of the following attacks are prevented from a mutual authentication solution?

Each correct answer represents a complete solution. Choose all that apply.

A.

Man-in-the-middle attack

B.

Eavesdropping attack

C.

Hijacking

D.

Phishing

Which of the following TShark options is used to set capture buffer size in MB?

A.

-F

B.

-G

C.

-C

D.

-B

Which of the following is a version of netcat with integrated transport encryption capabilities?

A.

Nikto

B.

Encat

C.

Cryptcat

D.

Socat

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Follow the rules of evidence and never temper with the evidence.

B.

Examine original evidence and never rely on the duplicate evidence.

C.

Never exceed the knowledge base of the forensic investigation.

D.

Prepare a chain of custody and handle the evidence carefully.

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf("%s", str).

What attack will his program expose the Web application to?

A.

Sequence++ attack

B.

SQL injection attack

C.

Cross Site Scripting attack

D.

Format string attack

Which of the following commands will you use with the tcpdump command to capture the traffic from a filter stored in a file?

A.

tcpdump -F file_name

B.

tcpdump -A file_name

C.

tcpdump -D file_name

D.

tcpdump -X file_name

Which of the following command-line utilities is used to show the state of current TCP/IP connections?

A.

PING

B.

NSLOOKUP

C.

NETSTAT

D.

TRACERT

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf("%s", str).

What attack will his program expose the Web application to?

A.

Cross Site Scripting attack

B.

SQL injection attack

C.

Format string attack

D.

Sequence++ attack

Fill in the blank with the appropriate tool name.

__________ consists of flexible system architecture that provides a proper way for conducting industrial audits when it is required to identify unique positions of items.