Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session. The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason.

Which of the following mistakes made by Jason helped the Forensic Investigators catch him?

A.

Jason did not perform a vulnerability assessment.

B.

Jason did not perform OS fingerprinting.

C.

Jason did not perform foot printing.

D.

Jason did not perform covering tracks.

E.

Jason did not perform port scanning.

Which of the following statements are true about worms?

Each correct answer represents a complete solution. Choose all that apply.

A.

Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

B.

Worms can exist inside files such as Word or Excel documents.

C.

One feature of worms is keystroke logging.

D.

Worms replicate themselves from one system to another without using a host file.

In which of the following scanning methods do Windows operating systems send only RST packets irrespective of whether the port is open or closed?

A.

TCP FIN

B.

FTP bounce

C.

XMAS

D.

TCP SYN

Adam works as an Incident Handler for Umbrella Inc. He has been sent to the California unit to train the members of the incident response team. As a demo project he asked members of the incident response team to perform the following actions:

Remove the network cable wires.

Isolate the system on a separate VLAN

Use a firewall or access lists to prevent communication into or out of the system.

Change DNS entries to direct traffic away from compromised system

Which of the following steps of the incident handling process includes the above actions?

A.

Identification

B.

Containment

C.

Eradication

D.

Recovery

Which of the following tools can be used to perform brute force attack on a remote database?

Each correct answer represents a complete solution. Choose all that apply.

A.

SQLBF

B.

SQLDict

C.

FindSA

D.

nmap

Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?

A.

Rainbow attack

B.

Brute Force attack

C.

Dictionary attack

D.

Hybrid attack

Which of the following are the primary goals of the incident handling team?

Each correct answer represents a complete solution. Choose all that apply.

A.

Freeze the scene.

B.

Repair any damage caused by an incident.

C.

Prevent any further damage.

D.

Inform higher authorities.

Which of the following types of attacks is only intended to make a computer resource unavailable to its users?

A.

Denial of Service attack

B.

Replay attack

C.

Teardrop attack

D.

Land attack

Which of the following statements are true about tcp wrappers?

Each correct answer represents a complete solution. Choose all that apply.

A.

tcp wrapper provides access control, host address spoofing, client username lookups, etc.

B.

When a user uses a TCP wrapper, the inetd daemon runs the wrapper program tcpd instead of running the server program directly.

C.

tcp wrapper allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens to filter for access control purposes.

D.

tcp wrapper protects a Linux server from IP address spoofing.

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

A.

Ping of death

B.

Jolt

C.

Fraggle

D.

Teardrop