Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Joseph works as a Network Administrator for WebTech Inc. He has to set up a centralized area on the network so that each employee can share resources and documents with one another. Which of the following will he configure to accomplish the task?

A.

WEP

B.

VPN

C.

Intranet

D.

Extranet

Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?

A.

E-mail spoofing

B.

E-mail Spam

C.

E-mail bombing

D.

E-mail Storm

You want to perform an active session hijack against Secure Inc. You have found a target that allows Telnet session. You have also searched an active session due to the high level of traffic on the network. What should you do next?

A.

Use a sniffer to listen network traffic.

B.

Use macoff to change MAC address.

C.

Guess the sequence numbers.

D.

Use brutus to crack telnet password.

Which of following tasks can be performed when Nikto Web scanner is using a mutation technique?

Each correct answer represents a complete solution. Choose all that apply.

A.

Guessing for password file names.

B.

Sending mutation payload for Trojan attack.

C.

Testing all files with all root directories.

D.

Enumerating user names via Apache.

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of the Bluehill Inc. For this, you start monitoring the network traffic of the Bluehill Inc.

In this process, you get that there are too many FTP packets traveling in the Bluehill Inc. network.

Now, you want to sniff the traffic and extract usernames and passwords of the FTP server. Which of the following tools will you use to accomplish the task?

A.

Ettercap

B.

L0phtcrack

C.

NetStumbler

D.

SARA

Which of the following tools is spyware that makes Windows clients send their passwords as clear text?

A.

Pwddump2

B.

SMBRelay

C.

KrbCrack

D.

C2MYAZZ

Anonymizers are the services that help make a user's own Web surfing anonymous. An anonymizer removes all the identifying information from a user's computer while the user surfs the Internet. It ensures the privacy of the user in this manner. After the user anonymizes a Web access with an anonymizer prefix, every subsequent link selected is also automatically accessed anonymously. Which of the following are limitations of anonymizers?

Each correct answer represents a complete solution. Choose all that apply.

A.

Java applications

B.

Secure protocols

C.

ActiveX controls

D.

JavaScript

E.

Plugins

Analyze the screenshot below, which of the following sets of results will be retrieved using this search?

A.

Pages from the domain sans.edu that have external links.

B.

Files of type .php from the domain sans.edu.

C.

Pages that contain the term ext:php and slte.sans.edu.

D.

Files of type .php that redirect to the sans.edu domain.

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = 'attacker@somehwere.com'; DROP TABLE members; --'

What task will the above SQL query perform?

A.

Performs the XSS attacks.

B.

Deletes the entire members table.

C.

Deletes the rows of members table where email id is 'attacker@somehwere.com' given.

D.

Deletes the database in which members table resides.

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:

l Gathering information

l Determining the network range

l Identifying active systems

Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

A.

APNIC

B.

SuperScan

C.

RIPE

D.

ARIN