Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the Linux operating system. He wants to use a wireless sniffer to sniff the We-are-secure network. Which of the following tools will he use to accomplish his task?

A.

WEPCrack

B.

Kismet

C.

Snadboy's Revelation

D.

NetStumbler

You work as the Project Engineer for XYZ CORP. The company has a Unix-based network. Your office consists of one server, seventy client computers, and one print device. You raise a request for printing a confidential page. After 30 minutes, you find that your print request job is not processed and is at the seventh position in the printer queue. You analyze that it shall take another one hour to print. You decide to remove your job from the printer queue and get your page printed outside the office. Which of the following Unix commands can you use to remove your job from the printer queue?

A.

tunelp

B.

pr

C.

lprm

D.

gs

John works as a Security Professional. He is assigned a project to test the security of www.we-are-secure.com. John wants to get the information of all network connections and listening ports in the numerical form. Which of the following commands will he use?

A.

netstat -e

B.

netstat –r

C.

netstat -s

D.

netstat –an

George works as an office assistant in Soft Well Inc. The company uses the Windows Vista operating system. He wants to disable a program running on a computer. Which of the following Windows Defender tools will he use to accomplish the task?

A.

Allowed items

B.

Quarantined items

C.

Options

D.

Software Explorer

The Security Auditor's Research Assistant (SARA) is a third generation network security analysis tool. Which of the following statements are true about SARA? (Choose two)

A.

It operates under Unix, Linux, MAC OS/X, or Windows (through coLinux) OS.

B.

It cannot be used to perform exhaustive XSS tests.

C.

It cannot be used to perform SQL injection tests.

D.

It supports plug-in facility for third party apps.

Which of the following statements are true about the Enum tool?

A.

It uses NULL and User sessions to retrieve user lists, machine lists, LSA policy information, etc.

B.

It is capable of performing brute force and dictionary attacks on individual accounts of Windows NT/2000.

C.

One of the countermeasures against the Enum tool is to disable TCP port 139/445.

D.

It is a console-based Win32 information enumeration utility.

Which of the following statements are true about a hot site?

A.

It is a duplicate of the original site of the organization, with full computer systems as well as near-complete backups of user data.

B.

It is the most inexpensive backup site.

C.

It can be used within an hour for data recovery.

D.

It is cheaper than a cold site but more expensive than a worm site.

Which of the following is a basic feature of the Unix operating system? (Choose three)

A.

It is highly portable across hardware.

B.

All files can be individually protected using read, write, and execute permissions for the user, group, and others.

C.

It allows all the modules to be loaded into memory.

D.

A user can execute multiple programs at the same time from a single terminal.

Which of the following types of servers are dedicated to provide resources to hosts on the network? (Choose three)

A.

Web servers

B.

Monitoring servers

C.

Mail servers

D.

Default gateway servers

E.

Print servers

What will be the output of the following command? echo $(date %M) > date.txt

A.

The current time (Month) will be written in the date.txt file.

B.

It will create a variable $(date %M).

C.

It will print a string "date %M".

D.

The current time (Minutes) will be written in the date.txt file.