Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for ca
Which of the following honeypots is a low-interaction honeypot and is used by companies or
corporations for capturing limited information about malicious hackers?
Which of the following actions will you take to accomplish the task?
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active
Directory-based single domain single forest network. The functional level of the forest is Windows
Server 2003. The company has recently provided fifty laptops to its sales team members. You are
required to configure an 802.11 wireless network for the laptops. The sales team members must
be able to use their data placed at a server in a cabled network. The planned network should be
able to handle the threat of unauthorized access and data interception by an unauthorized user.
You are also required to prevent the sales team members from communicating directly to one
another. Which of the following actions will you take to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements are TRUE about Demilitarized zone (DMZ)?
Which of the following statements are TRUE about Demilitarized zone (DMZ)?
Each correct answer represents a complete solution. Choose all that apply.
which of the following complaint types does a fraudulent transaction take place?
In which of the following complaint types does a fraudulent transaction take place?
Which of the following malicious software is used by several advertising websites for downloading and displayi
Which of the following malicious software is used by several advertising websites for downloading
and displaying advertisements in the Web browser without user permission?
Which of the following parameters are required to be followed on receiving a suspicious mail according to the
Which of the following parameters are required to be followed on receiving a suspicious mail
according to the Department of Justice?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?
Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network
run on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to
boot. Andrew wants to check the booting process. He suspects that an error persists in the
bootloader of Mac OS X. Which of the following is the default bootloader on Mac OS X that he
should use to resolve the issue?
Which of the following companies are the providers of Anti-virus softwares?
An Anti-Virus software is used to prevent, detect, and remove malware from a system, including
computer viruses, worms, and Trojan horses. Which of the following companies are the providers
of Anti-virus softwares?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following can be used to perform stress testing?
Burp Suite is a Java application for attacking web applications. This tool includes a proxy server, a
spider, an intruder, and a repeater. Which of the following can be used to perform stress testing?
Which of the following mistakes made by Jason helped the Forensic Investigators catch him?
Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking
on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based
network. Jason successfully enters the target system remotely by using the advantage of
vulnerability. He places a Trojan to maintain future access and then disconnects the remote
session.
The employees of the company complain to Mark, who works as a Professional Ethical Hacker for
DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that
some irrelevant log files and signs of Trojans are present on the computers. He suspects that a
malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and
catches Jason. Which of the following mistakes made by Jason helped the Forensic Investigators
catch him?