Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Checkpoint files

B.

cookie files

C.

Temporary files

D.

EDB and STM database files

Which of the following standards is used in wireless local area networks (WLANs)?

A.

IEEE 802.4

B.

IEEE 802.3

C.

IEEE 802.11b

D.

IEEE 802.5

Which of the following United States laws protects stored electronic information?

A.

Title 18, Section 1029

B.

Title 18, Section 1362

C.

Title 18, Section 2701

D.

Title 18, Section 2510

You want to run the nmap command that includes the host specification of 202.176.56-57.*. How many hosts will you scan?

A.

512

B.

64

C.

1024

D.

256

You have obtained the hash below from the /etc/shadow file. What are you able to discern simply by looking at this hash?

A.

A4XD$B4COCqWaEpFjLLDe. is a SHAI hash that was created using the salt $1

SuWeOhL6k$ 1

B.

A4XD$B4COCqWaEpFjLLDe. is an MD5 hash that was created using the salt $1

SuWeOhL6k$

C.

A4XDsB4COGqWaEpFjLLDe. is an MD5 hash that was created using the salt

uWeOhL6k

D.

A4XDsB4COCqWaEpFjLLDe. is a SHAI hash that was created using the salt

uweohL6k

What difference would you expect to result from running the following commands;

(I). S dig ©ns domain.com target.com -t AXFR

and

(2). S dig ©ns.domain.com target.com -t IXFR=1002200301

A.

Command (I) will display incremental information about a domain and command (2)

Will provide only 1002200301 bytes of information

B.

Command (1) will display all information about a domain and command (2) willprovide only incremental updates from SOA 1002200301

C.

Command (I) will display all information about a domain and command (2) willprovide only incremental updates up to SOA 1002200301

D.

Command (I) will display all information about a domain and command (2) willprovide only 1002200301 bytes of information

John works as an Ethical Hacker for uCertify Inc. He wants to find out the ports that are open in uCertify's server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?

A.

TCP FIN

B.

Xmas tree

C.

TCP SYN/ACK

D.

TCP SYN

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

A.

UDP

B.

TCP SYN/ACK

C.

IDLE

D.

RPC

How many bits does SYSKEY use for encryption?

A.

32

B.

64

C.

512

D.

128

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the preattack phase successfully:

Information gathering

Determination of network range

Identification of active systems

Location of open ports and applications

Now, which of the following tasks should he perform next?

A.

Perform OS fingerprinting on the We-are-secure network.

B.

Map the network of We-are-secure Inc.

C.

Fingerprint the services running on the we-are-secure network.

D.

Install a backdoor to log in remotely on the We-are-secure server.