PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following techniques can she use to gather information from the switched network or to disable so

Samantha was hired to perform an internal security test of company. She quickly realized that all networks are making use of switches instead of traditional hubs. This greatly limits her ability to gather information through network sniffing.

Which of the following techniques can she use to gather information from the switched network or to disable some of the traffic isolation features of the switch? (Choose two)

Which registry entry will you add a key to make it persistent?

You are writing an antivirus bypassing Trojan using C++ code wrapped into chess.c to create an executable file chess.exe. This Trojan when executed on the victim machine, scans the entire system (c:) for data with the following text "Credit Card" and "password". It then zips all the scanned files and sends an email to a predefined hotmail address.

You want to make this Trojan persistent so that it survives computer reboots. Which registry entry will you add a key to make it persistent?


Page 539 of 555« First...102030...537538539540541...550...Last »