Which of the following commands will you use to accomplish the task?
You want to rename a file foo to the file bar and move the file bar to the /tmp folder. Which of the
following commands will you use to accomplish the task?
Which of the following attacks can be performed by Brutus for password cracking?
Brutus is a password cracking tool that can be used to crack the following authentications:
·HTTP (Basic Authentication)
·HTTP (HTML Form/CGI)
·POP3 (Post Office Protocol v3)
·FTP (File Transfer Protocol)
·SMB (Server Message Block)
·Telnet
Which of the following attacks can be performed by Brutus for password cracking?
Each correct answer represents a complete solution. Choose all that apply.
which of the following laws can the employee be prosecuted?
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United
States. A project has been assigned to him to investigate a case of a disloyal employee who is
suspected of stealing design of the garments, which belongs to the company and selling those
garments of the same design under different brand name. Adam investigated that the company
does not have any policy related to the copy of design of the garments. He also investigated that
the trademark under which the employee is selling the garments is almost identical to the original
trademark of the company. On the grounds of which of the following laws can the employee be
prosecuted?
Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microso
Which of the following is a network worm that exploits the RPC sub-system vulnerability present in
the Microsoft Windows operating system?
Which of the following cryptographic system services ensures that information will not be disclosed to any un
Which of the following cryptographic system services ensures that information will not be disclosed
to any unauthorized person on a local network?
Which of the following tools will John use to accomplish the task?
John works as a professional Ethical Hacker. He is assigned a project to test the security of
www.we-are-secure.com. He is working on the Linux operating system. He wants to sniff the
weare- secure network and intercept a conversation between two employees of the company
through session hijacking. Which of the following tools will John use to accomplish the task?
Which of the following statements are true about Sawmill?
Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from
syslog servers and network devices such as Router and switches. He is facing difficulty in
analyzing the logs that he has retrieved. To solve this problem, Adam decides to use software
called Sawmill. Which of the following statements are true about Sawmill?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following e-mail crimes is Peter committing?
Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS
listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE)
messages on these addresses. Which of the following e-mail crimes is Peter committing?
Which of the following types of attacks have been executed?
You work as a Desktop Technician for Umbrella Inc. The company has a Windows-based network.
You receive an e-mail from the network administrator’s e-mail ID asking you to provide your
password so that he can make changes to your profile. You suspect that someone is trying to hack
your password after you have confirmed that the network administrator did not send any such type
of e-mail. Which of the following types of attacks have been executed?
Each correct answer represents a part of the solution. Choose all that apply.
What type of threat is this?
You work as a Network Security Administrator for NetPerfect Inc. The company has a
Windowsbased network. You are incharge of the data and network security of the company. While
performing a threat log analysis, you observe that one of the database administrators is pilfering
confidential data. What type of threat is this?