Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following tools is used for port redirection?

A.

SubSeven

B.

Fpipe

C.

NetBus

D.

Loki

Which of the following is a tool for SSH and SSL MITM attacks?

A.

Ettercap

B.

Cain

C.

Dsniff

D.

AirJack

In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?

A.

Insertion

B.

Evasion

C.

Fragmentation overwrite

D.

Fragmentation overlap

Which of the following tools can be used to automate the MITM attack?

A.

Hotspotter

B.

Airjack

C.

IKECrack

D.

Kismet

LM hash is one of the password schemes that Microsoft LAN Manager and Microsoft Windows versions prior to the Windows Vista use to store user passwords that are less than 15 characters long. If you provide a password seven characters or less, the second half of the LM hash is always __________.

A.

0xAAD3B435B51404EE

B.

0xBBD3B435B51504FF

C.

0xBBC3C435C51504EF

D.

0xAAD3B435B51404FF

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Rule based attack

C.

Hybrid attack

D.

Brute Force attack

Which of the following tasks is NOT performed into the enumeration phase?

A.

Discovering NetBIOS names

B.

Obtaining Active Directory information and identifying vulnerable user accounts

C.

Injecting a backdoor to the remote computer to gain access in it remotely

D.

Establishing NULL sessions and queries

Which of the following is a web ripping tool?

A.

Netcat

B.

NetBus

C.

SuperScan

D.

Black Widow

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:

Gathering information

Determining the network range

Identifying active systems

Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

A.

APNIC

B.

SuperScan

C.

ARIN

D.

RIPE

Which of the following tools can be used for session splicing attacks?

A.

ADMutate

B.

APNIC

C.

Whisker

D.

ARIN