New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Fill in the blank with the appropriate term.

______ is a free Unix subsystem that runs on top of Windows.

Which of the following tools can be used as penetration tools in the Information system auditing process?

Each correct answer represents a complete solution. Choose two.

A.

Nmap

B.

Snort

C.

SARA

D.

Nessus

In which of the following attacks does an attacker spoof the source address in IP packets that are sent to the victim?

A.

Dos

B.

DDoS

C.

Backscatter

D.

SQL injection

Which of the following programming languages are NOT vulnerable to buffer overflow attacks?

Each correct answer represents a complete solution. Choose two.

A.

C

B.

Java

C.

C++

D.

Perl

Which of the following attacks are examples of Denial-of-service attacks (DoS)?

Each correct answer represents a complete solution. Choose all that apply.

A.

Fraggle attack

B.

Smurf attack

C.

Birthday attack

D.

Ping flood attack

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration. The tool uses raw IP packets to determine the following:

What ports are open on our network systems.

What hosts are available on the network.

Identify unauthorized wireless access points.

What services (application name and version) those hosts are offering.

What operating systems (and OS versions) they are running.

What type of packet filters/firewalls are in use.

Which of the following tools is Victor using?

A.

Nessus

B.

Kismet

C.

Nmap

D.

Sniffer

Which of the following is a type of computer security vulnerability typically found in Web applications that allow code injection by malicious Web users into the Web pages viewed by other users?

A.

SID filtering

B.

Cookie poisoning

C.

Cross-site scripting

D.

Privilege Escalation

In which of the following methods does an hacker use packet sniffing to read network traffic between two parties to steal the session cookies?

A.

Cross-site scripting

B.

Physical accessing

C.

Session fixation

D.

Session sidejacking

Adam, a malicious hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct Man-in-The-Middle attack.

Which of the following is the destination MAC address of a broadcast frame?

A.

0xDDDDDDDDD

B.

0x00000000000

C.

0xFFFFFFFFFFFF

D.

0xAAAAAAAAAA

In which of the following steps of the incident handling processes does the Incident Handler make sure that all business processes and functions are back to normal and then also wants to monitor the system or processes to ensure that the system is not compromised again?

A.

Eradication

B.

Lesson Learned

C.

Recovery

D.

Containment