New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following attacks can be overcome by applying cryptography?

A.

Buffer overflow

B.

Web ripping

C.

Sniffing

D.

DoS

Which of the following penetration testing phases involves reconnaissance or data gathering?

A.

Attack phase

B.

Pre-attack phase

C.

Post-attack phase

D.

Out-attack phase

Which of the following systems is used in the United States to coordinate emergency preparedness and incident management among various federal, state, and local agencies?

A.

US Incident Management System (USIMS)

B.

National Disaster Management System (NDMS)

C.

National Emergency Management System (NEMS)

D.

National Incident Management System (NIMS)

Which of the following tools will you use to prevent from session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

A.

OpenSSH

B.

Rlogin

C.

Telnet

D.

SSL

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

A.

nmap

B.

scanlogd

C.

libnids

D.

portsentry

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

A.

Shoulder surfing

B.

File integrity auditing

C.

Reconnaissance

D.

Spoofing

Which of the following nmap command parameters is used for TCP SYN port scanning?

A.

-sF

B.

-sU

C.

-sX

D.

-sS

In which of the following malicious hacking steps does email tracking come under?

A.

Reconnaissance

B.

Gaining access

C.

Maintaining Access

D.

Scanning

You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. You want to use a scanning technique which works as a reconnaissance attack. The technique should direct to a specific host or network to determine the services that the host offers.

Which of the following scanning techniques can you use to accomplish the task?

A.

IDLE scan

B.

Nmap

C.

SYN scan

D.

Host port scan

Which of the following statements about Ping of Death attack is true?

A.

In this type of attack, a hacker sends more traffic to a network address than the buffer can handle.

B.

This type of attack uses common words in either upper or lower case to find a password.

C.

In this type of attack, a hacker maliciously cuts a network cable.

D.

In this type of attack, a hacker sends ICMP packets greater than 65,536 bytes to crash a system.