PrepAway - Latest Free Exam Questions & Answers

Author: admin

Which of the following DOS commands will John use to accomplish the task?

John works as a professional Ethical Hacker for SecureEnet Inc. The company has a
Windowsbased network. All client computers run on Windows XP. A project has been assigned to
John to investigate about the open ports responsible for various malicious attacks on the network.
John wants to use the DOS command-line utility to find out the open ports.
Which of the following DOS commands will John use to accomplish the task?

Which of the following violations has been committed by Mola Co.?

Cola Co. manufactures, markets, sells, and distributes non-alcoholic potables such as Lemcaa
and Thunder Up under its brand name Cola and uses green and red logo. Mola Co., a new
company, starts manufacturing, marketing, selling, and distributing non-alcoholic potables like
Lumca and Cloud Up under its brand name Mola and uses green and red logo. Which of the
following violations has been committed by Mola Co.?

What is the IP address of the sender of this email?

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic
project. Now, you want to know the IP address of the sender so that you can analyze various
information such as the actual location, domain information, operating system being used, contact
information, etc. of the email sender with the help of various tools and resources. You also want to
check whether this email is fake or real. You know that analysis of email headers is a good starting
point in such cases. The email header of the suspicious email is given below:

What is the IP address of the sender of this email?

Which of the following is the correct order for searching data on a Windows based system?

Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to

investigate the computer of an employee, who is suspected for classified data theft. Suspect’s
computer runs on Windows operating system. Peter wants to collect data and evidences for
further analysis. He knows that in Windows operating system, the data is searched in pre-defined
steps for proper and efficient analysis. Which of the following is the correct order for searching
data on a Windows based system?


Page 174 of 231« First...102030...172173174175176...180190200...Last »