Which of the following DOS commands will John use to accomplish the task?
John works as a professional Ethical Hacker for SecureEnet Inc. The company has a
Windowsbased network. All client computers run on Windows XP. A project has been assigned to
John to investigate about the open ports responsible for various malicious attacks on the network.
John wants to use the DOS command-line utility to find out the open ports.
Which of the following DOS commands will John use to accomplish the task?
Which of the following attacks is used by attackers to access a company’s internal network through its r
Which of the following attacks is used by attackers to access a company’s internal network
through its remote access system?
Which of the following Trojans is used by attackers to modify the Web browser settings?
Which of the following Trojans is used by attackers to modify the Web browser settings?
Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?
Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following attacks is a man-in-the-middle exploit where a third party can gain HTTPS cookie data?
Which of the following attacks is a man-in-the-middle exploit where a third party can gain HTTPS
cookie data?
Which of the following is an example of a low-interaction production honeypot that is developed and sold by th
Which of the following is an example of a low-interaction production honeypot that is developed
and sold by the Swiss company Netsec?
Which of the following violations has been committed by Mola Co.?
Cola Co. manufactures, markets, sells, and distributes non-alcoholic potables such as Lemcaa
and Thunder Up under its brand name Cola and uses green and red logo. Mola Co., a new
company, starts manufacturing, marketing, selling, and distributing non-alcoholic potables like
Lumca and Cloud Up under its brand name Mola and uses green and red logo. Which of the
following violations has been committed by Mola Co.?
What is the IP address of the sender of this email?
You work as a Network Security Analyzer. You got a suspicious email while working on a forensic
project. Now, you want to know the IP address of the sender so that you can analyze various
information such as the actual location, domain information, operating system being used, contact
information, etc. of the email sender with the help of various tools and resources. You also want to
check whether this email is fake or real. You know that analysis of email headers is a good starting
point in such cases. The email header of the suspicious email is given below:
What is the IP address of the sender of this email?
Which of the following is the correct order for searching data on a Windows based system?
Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to
investigate the computer of an employee, who is suspected for classified data theft. Suspect’s
computer runs on Windows operating system. Peter wants to collect data and evidences for
further analysis. He knows that in Windows operating system, the data is searched in pre-defined
steps for proper and efficient analysis. Which of the following is the correct order for searching
data on a Windows based system?
Which of the following organizations is dedicated to computer security research and information sharing?
Which of the following organizations is dedicated to computer security research and information
sharing?