Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following scanning methods is most accurate and reliable, although it is easily detectable and hence avoided by a hacker?

A.

TCP FIN

B.

TCP half-open

C.

TCP SYN/ACK

D.

Xmas Tree

Which of the following are considered Bluetooth security violations?

Each correct answer represents a complete solution. Choose two.

A.

SQL injection attack

B.

Cross site scripting attack

C.

Bluebug attack

D.

Bluesnarfing

E.

Social engineering

Which of the following methods can be used to detect session hijacking attack?

A.

ntop

B.

Brutus

C.

nmap

D.

sniffer

Which of the following statements are true about the Enum tool?

Each correct answer represents a complete solution. Choose all that apply.

A.

It is capable of performing brute force and dictionary attacks on individual accounts of Windows NT/2000.

B.

One of the countermeasures against the Enum tool is to disable TCP port 139/445.

C.

It is a console-based Win32 information enumeration utility.

D.

It uses NULL and User sessions to retrieve user lists, machine lists, LSA policy information, etc.

You want to retrieve password files (stored in the Web server's index directory) from various Web sites. Which of the following tools can you use to accomplish the task?

A.

Nmap

B.

Sam spade

C.

Whois

D.

Google