Which tool can be used to silently copy files from USB devices?
Which tool can be used to silently copy files from USB devices?
How can a rootkit bypass Windows 7 operating system’s kernel mode, code signing policy?
How can a rootkit bypass Windows 7 operating system’s kernel mode, code signing policy?
What is the first step that the bank should take before enabling the audit feature?
A bank stores and processes sensitive privacy information related to home loans. However,
auditing has never been enabled on the system. What is the first step that the bank should take
before enabling the audit feature?
What is the consultant’s obligation to the financial organization?
A consultant has been hired by the V.P. of a large financial organization to assess the company’s
security posture. During the security testing, the consultant comes across child pornography on
the V.P.’s computer. What is the consultant’s obligation to the financial organization?
How is sniffing broadly categorized?
How is sniffing broadly categorized?
Which command would the engineer use to accomplish this?
An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The
engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would
the engineer use to accomplish this?
What is the appropriate next step?
A computer technician is using a new version of a word processing software package when it
is discovered that a special sequence of characters causes the entire computer to crash. The
technician researches the bug and discovers that no one else experienced the problem. What is
the appropriate next step?
What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a ho
What is the most secure way to mitigate the theft of corporate information from a laptop that was
left in a hotel room?
What should the security team do to determine which alerts to check first?
The intrusion detection system at a software development company suddenly generates multiple
alerts regarding attacks against the company’s external webserver, VPN concentrator, and DNS
servers. What should the security team do to determine which alerts to check first?
Which technique could be used to obtain login credentials?
A corporation hired an ethical hacker to test if it is possible to obtain users’ login credentials using
methods other than social engineering. Access to offices and to a network node is granted.
Results from server scanning indicate all are adequately patched and physical access is denied,
thus, administrators have access only through Remote Desktop. Which technique could be used
to obtain login credentials?