Which of the following is used to authenticate asymmetric keys?
Which of the following is used to authenticate asymmetric keys?
Which of the following programs is used for bypassing normal authentication for securing remote access to a co
Which of the following programs is used for bypassing normal authentication for securing remote
access to a computer?
which a product is identified?
Which of the following is a name, symbol, or slogan with which a product is identified?
Which of the following tools can he use to accomplish his task?
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully completed the following steps of the
preattack phase:
·Information gathering
·Determining network range
·Identifying active machines
·Finding open ports and applications
·OS fingerprinting
·Fingerprinting services
Now John wants to perform network mapping of the We-are-secure network. Which of the
following tools can he use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following attacks is John performing?
John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open
connections simultaneously so that all hosts behind it are effectively disabled. Which of the
following attacks is John performing?
Which of the following statements are correct about spoofing and session hijacking?
Which of the following statements are correct about spoofing and session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target
In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536
bytes to the target system?
Which of the following worms has attacked the computer?
John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based
network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the
company complains to John that his system contains an unknown package named as tar.gz and
his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about
the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that
the other computers on the network are also facing the same problem. John discovers that a
malicious application is using the synscan tool to randomly generate IP addresses.
Which of the following worms has attacked the computer?
Which two technologies should research groups use for secure VPN access while traveling?
Which two technologies should research groups use for secure VPN access while traveling?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose two.
Which of the following are the most likely threats to his computer?
Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection
using his computer running on Windows XP operating system. Which of the following are the most
likely threats to his computer?
Each correct answer represents a complete solution. Choose two.