Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?

A.

Trojan Man

B.

EliteWrap

C.

Tiny

D.

NetBus

Which of the following are types of access control attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Spoofing

B.

Brute force attack

C.

Dictionary attack

D.

Mail bombing

You have configured a virtualized Internet browser on your Windows XP professional computer. Using the virtualized Internet browser, you can protect your operating system from which of the following?

A.

Brute force attack

B.

Mail bombing

C.

Distributed denial of service (DDOS) attack

D.

Malware installation from unknown Web sites

Which of the following is a type of computer security vulnerability typically found in Web applications that allow code injection by malicious Web users into the Web pages viewed by other users?

A.

SID filtering

B.

Cookie poisoning

C.

Cross-site scripting

D.

Privilege Escalation

Which of the following is a technique for creating Internet maps?

Each correct answer represents a complete solution. Choose two.

A.

Active Probing

B.

AS PATH Inference

C.

Object Relational Mapping

D.

Network Quota

Against which of the following does SSH provide protection?

Each correct answer represents a complete solution. Choose two.

A.

DoS attack

B.

IP spoofing

C.

Password sniffing

D.

Broadcast storm

In which of the following malicious hacking steps does email tracking come under?

A.

Reconnaissance

B.

Gaining access

C.

Maintaining Access

D.

Scanning

Which of the following can be used as a countermeasure against the SQL injection attack?

Each correct answer represents a complete solution. Choose two.

A.

mysql_real_escape_string()

B.

session_regenerate_id()

C.

mysql_escape_string()

D.

Prepared statement

In which of the following attacks does an attacker create the IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system?

A.

Rainbow attack

B.

IP address spoofing

C.

Cross-site request forgery

D.

Polymorphic shell code attack

Fill in the blank with the appropriate term.

______ is a free Unix subsystem that runs on top of Windows.