Which of the following operating systems can be easily identified with the help of TCP FIN scanning?
TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to
the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the
attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be
ignored and the port will drop the packet. Which of the following operating systems can be easily
identified with the help of TCP FIN scanning?
Which of the following is the correct order for searching data on a Windows based system?
Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to
investigate the computer of an employee, who is suspected for classified data theft. Suspect’s
computer runs on Windows operating system. Peter wants to collect data and evidences for
further analysis. He knows that in Windows operating system, the data is searched in pre-defined
steps for proper and efficient analysis. Which of the following is the correct order for searching
data on a Windows based system?
________ takes best advantage of an existing authenticated connection
Fill in the blank with the appropriate name of the attack.
________ takes best advantage of an existing authenticated connection
Secure Socket Layer (SSL) operates at the________ layer of the OSI model.
Fill in the blank with the appropriate layer name of the OSI model.
Secure Socket Layer (SSL) operates at the________ layer of the OSI model.
Which of the following tools is John using to crack the wireless encryption keys?
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The
description of the tool is as follows:
Which of the following tools is John using to crack the wireless encryption keys?
which of the following laws can the employee be prosecuted?
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United
States. A project has been assigned to him to investigate a case of a disloyal employee who is
suspected of stealing design of the garments, which belongs to the company and selling those
garments of the same design under different brand name. Adam investigated that the company
does not have any policy related to the copy of design of the garments. He also investigated that
the trademark under which the employee is selling the garments is almost identical to the original
trademark of the company. On the grounds of which of the following laws can the employee be
prosecuted?
which is used to authenticate the bitstream images?
Which of the following algorithms produces a digital signature which is used to authenticate the bitstream images?
Which of the following agencies is responsible for handling computer crimes in the United States?
Which of the following agencies is responsible for handling computer crimes in the United States?
Which of the following is true for XSS, SQL injection, and RFI?
Which of the following is true for XSS, SQL injection, and RFI?
Which of the following law does not protect intellectual property?
Which of the following law does not protect intellectual property?