Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?

A.

Alternate Data Streams is a feature of Linux operating system.

B.

Adam's system runs on Microsoft Windows 98 operating system.

C.

Adam is using FAT file system.

D.

Adam is using NTFS file system.

One of the sales people in your company complains that sometimes he gets a lot of unsolicited messages on his PDA. After asking a few questions, you determine that the issue only occurs in crowded areas like airports. What is the most likely problem?

A.

Blue snarfing

B.

Blue jacking

C.

A virus

D.

Spam

Which of the following tools allows you to download World Wide Web sites from the Internet to a local computer?

A.

Netcraft

B.

HTTrack

C.

Netstat

D.

Cheops-ng

Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

A.

FTK Imager

B.

FAU

C.

Device Seizure

D.

Galleta

You want to retrieve the default security report of nessus. Which of the following google search queries will you use?

A.

site:pdf nessus "Assessment report"

B.

filetype:pdf nessus

C.

filetype:pdf "Assessment Report" nessus

D.

link:pdf nessus "Assessment report"

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure. com Website. The we-are-secure.com Web server is using Linux operating system. When you port scanned the we-are-secure.com Web server, you got that TCP port 23, 25, and 53 are open. When you tried to telnet to port 23, you got a blank screen in response. When you tried to type the dir, copy, date, del, etc. commands you got only blank spaces or underscores symbols on the screen. What may be the reason of such unwanted situation?

A.

The we-are-secure.com server is using honeypot.

B.

The telnet session is being affected by the stateful inspection firewall.

C.

The telnet service of we-are-secure.com has corrupted.

D.

The we-are-secure.com server is using a TCP wrapper.

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-aresecure server. Which of the following are countermeasures against a brute force attack?

Each correct answer represents a complete solution. Choose all that apply.

A.

The site should use CAPTCHA after a specific number of failed login attempts.

B.

The site should restrict the number of login attempts to only three times.

C.

The site should force its users to change their passwords from time to time.

D.

The site should increase the encryption key length of the password.

You have received a file named new.com in your email as an attachment. When you execute this file in your laptop, you get the following message:

'EICAR-STANDARD-ANTIVIRUS-TEST-FILE!'

When you open the file in Notepad, you get the following string:

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

What step will you take as a countermeasure against this attack?

A.

Immediately shut down your laptop.

B.

Do nothing.

C.

Traverse to all of your drives, search new.com files, and delete them.

D.

Clean up your laptop with antivirus.

John works as a Penetration Tester in a security service providing firm named you-are-secure Inc.

Recently, John's company has got a project to test the security of a promotional Website

www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:

After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John."

Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

A.

XSS attack

B.

Replay attack

C.

Buffer overflow attack

D.

CSRF attack

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint. Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?

A.

nmap -O -p

B.

nmap -sS

C.

nmap -sU -p

D.

nmap –sT