PrepAway - Latest Free Exam Questions & Answers

Author: admin

Which of the following Netcat commands would be used to perform a UDP scan of the lower 1024 ports?

Which of the following Netcat commands would be used to perform a UDP scan of the lower 1024 ports?

Identify the remote server's port number by decoding the packet?

Jason’s Web server was attacked by a trojan virus. He runs protocol analyzer and notices that the Trojan communicates to a remote server on the Internet. Shown below is the standard “hexdump” representation of the network packet, before being decoded. Jason wants to identify the trojan by looking at the destination port number and mapping to a trojan-port number database on the Internet. Identify the remote server’s port number by decoding the packet?

In Linux, the three most common commands that hackers usually attempt to Trojan are:

In Linux, the three most common commands that hackers usually attempt to Trojan are:

What is the next step you would do?

You suspect that your Windows machine has been compromised with a Trojan virus. When you run anti-virus software it does not pick of the Trojan. Next you run netstat command to look for open ports and you notice a strange port 6666 open. What is the next step you would do?

Which command would you execute to extract the Trojan to a standalone file?

You have hidden a Trojan file virus.exe inside another file readme.txt using NTFS streaming. Which command would you execute to extract the Trojan to a standalone file?

Which of the following statements would not be a proper definition for a Trojan Horse?

Which of the following statements would not be a proper definition for a Trojan Horse?

In the following example, which of these is the "exploit"?

In the following example, which of these is the “exploit”? Today, Microsoft Corporation released a security notice. It detailed how a person could bring down the Windows 2003 Server operating system, by sending malformed packets to it. They detailed how this malicious process had been automated using basic scripting. Even worse, the new automated method for bringing down the server has already been used to perform denial of service attacks on many large commercial websites. Select the best answer.


Page 132 of 231« First...102030...130131132133134...140150160...Last »