What is it called?
This method is used to determine the Operating system and version running on a remote target
system. What is it called?
What has William just installed?
William has received a Chess game from someone in his computer programming class through
email. William does not really know the person who sent the game very well, but decides to install
the game anyway because he really likes Chess.
After William installs the game, he plays it for a couple of hours. The next day, William plays the
Chess game again and notices that his machine has begun to slow down. He brings up his Task
Manager and sees the following programs running:
What has William just installed?
What is the destination MAC address of a broadcast frame?
John the hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto
the wire to conduct MiTM attack. What is the destination MAC address of a broadcast frame?
How can this help you in foot printing the organization?
You are gathering competitive intelligence on an organization. You notice that they have jobs
listed on a few Internet job-hunting sites. There are two jobs for network and system
administrators. How can this help you in foot printing the organization?
which of the following bit set?
TCP packets transmitted in either direction after the initial three-way handshake will have which of
the following bit set?
Identify the line in the source code that might lead to buffer overflow?
The programmers on your team are analyzing the free, open source software being used to run
FTP services on a server in your organization. They notice that there is excessive number of
functions in the source code that might lead to buffer overflow. These C++ functions do not check
bounds. Identify the line in the source code that might lead to buffer overflow?
What framework architecture is shown in this exhibit?
Which of the following steganography utilities exploits the nature of white space and allows the user to conce
Which of the following steganography utilities exploits the nature of white space and allows the
user to conceal information in these white spaces?
How long will it take to crack the password by an attacker?
You have chosen a 22 character word from the dictionary as your password. How long will it take
to crack the password by an attacker?
What vulnerability is detected in the web application here?
While testing web applications, you attempt to insert the following test script into the search area
on the company’s web site:
<script>alert(‘Testing Testing Testing’)</script>
Later, when you press the search button, a pop up box appears on your screen with the text
“Testing Testing Testing”. What vulnerability is detected in the web application here?