New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is the method of hiding data within another media type such as graphic or document?

A.

Spoofing

B.

Steganography

C.

Packet sniffing

D.

Cryptanalysis

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

A.

Signature-based IDS

B.

Network-based IDS

C.

Passive IDS

D.

Active IDS

The IT administrator wants to implement a stronger security policy. What are the four most important security priorities for PassGuide Software Systems Pvt. Ltd.?

A.

Providing secure communications between the overseas office and the headquarters.

B.

Implementing Certificate services on Texas office.

C.

Protecting employee data on portable computers.

D.

Providing two-factor authentication.

E.

Ensuring secure authentication.

F.

Preventing unauthorized network access.

G.

Providing secure communications between Washington and the headquarters office.

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

A.

Scanning

B.

Preparation

C.

gaining access

D.

Reconnaissance

Which of the following virus is a script that attaches itself to a file or template?

A.

Boot sector

B.

Trojan horse

C.

Macro virus

D.

E-mail virus

Which of the following statements are correct about spoofing and session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

A.

Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target and the valid user cannot be active.

B.

Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target but the valid user can be active.

C.

Session hijacking is an attack in which an attacker takes over the session, and the valid user's session is disconnected.

D.

Session hijacking is an attack in which an attacker takes over the session, and the valid user's session is not disconnected.

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

A.

Smurf

B.

Denial of Service

C.

Evil Twin

D.

Virus

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. Your company is facing an IP spoofing attack.

Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?

A.

Despoof

B.

Dsniff

C.

ethereal

D.

Neotrace

Which of the following techniques can be used to map 'open' or 'pass through' ports on a gateway?

A.

Traceport

B.

Tracefire

C.

Tracegate

D.

Traceroute

Which of the following options scans the networks for vulnerabilities regarding the security of a network?

A.

System enumerators

B.

Port enumerators

C.

Network enumerators

D.

Vulnerability enumerators