PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What can Joe do to hide the wiretap program from being detected by ifconfig command?

Joe the Hacker breaks into XYZ’s Linux system and plants a wiretap program in order to sniff
passwords and user accounts off the wire. The wiretap program is embedded as a Trojan horse in
one of the network utilities. Joe is worried that network administrator might detect the wiretap
program by querying the interfaces to see if they are running in promiscuous mode.

What can Joe do to hide the wiretap program from being detected by ifconfig command?

What should the administrator do next?

Employees in a company are no longer able to access Internet web sites on their computers. The
network administrator is able to successfully ping IP address of web servers on the Internet and is
able to open web sites by using an IP address in place of the URL. The administrator runs the
nslookup command for www.eccouncil.org and receives an error message stating there is no
response from the server. What should the administrator do next?


Page 410 of 555« First...102030...408409410411412...420430440...Last »