Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following techniques does an attacker use to sniff data frames on a local area network and modify the traffic?

A.

MAC spoofing

B.

IP address spoofing

C.

Email spoofing

D.

ARP spoofing

Which of the following hacking tools provides shell access over ICMP?

A.

John the Ripper

B.

Nmap

C.

Nessus

D.

Loki

Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

A.

Port scanning

B.

ARP spoofing

C.

Man-in-the-middle

D.

Session hijacking

Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?

A.

Spoofing

B.

Hacking

C.

SYN attack

D.

PING attack

John works as an Ethical Hacker for PassGuide Inc. He wants to find out the ports that are open in PassGuide's server using a port scanner. However, he does not want to establish a full TCP connection.

Which of the following scanning techniques will he use to accomplish this task?

A.

TCP FIN

B.

TCP SYN/ACK

C.

TCP SYN

D.

Xmas tree

Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?

A.

Steganography

B.

Public-key cryptography

C.

RSA algorithm

D.

Encryption

You execute the following netcat command:

c:\target\nc -1 -p 53 -d -e cmd.exe

What action do you want to perform by issuing the above command?

A.

Listen the incoming data and performing port scanning

B.

Capture data on port 53 and performing banner grabbing

C.

Capture data on port 53 and delete the remote shell

D.

Listen the incoming traffic on port 53 and execute the remote shell

Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of Umbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer.

After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting.

for (( i = 0;i<11;i++ )); do dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda done

Which of the following actions does Adam want to perform by the above command?

A.

Infecting the hard disk with polymorphic virus strings.

B.

Deleting all log files present on the system.

C.

Wiping the contents of the hard disk with zeros.

D.

Making a bit stream copy of the entire hard disk for later download.

Which of the following protocols is a maintenance protocol and is normally considered a part of the IP layer, but has also been used to conduct denial-of-service attacks?

A.

ICMP

B.

L2TP

C.

TCP

D.

NNTP

Which of the following penetration testing phases involves gathering data from whois, DNS, and network scanning, which helps in mapping a target network and provides valuable information regarding the operating system and applications running on the systems?

A.

Post-attack phase

B.

On-attack phase

C.

Attack phase

D.

Pre-attack phase