What would be the name of this tool?
John is using a special tool on his Linux platform that has a database containing signatures to be
able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI/ASPX
scripts. Moreover, the database detects DDoS zombies and Trojans as well. What would be the
name of this tool?
Which of the following is the primary objective of a rootkit?
Which of the following is the primary objective of a rootkit?
What does this mean?
Fred is scanning his network to ensure it is as secure as possible. Fred sends a TCP probe packet
to a host with a FIN flag and he receives a RST/ACK response. What does this mean?
This kind of password cracking method uses word lists in combination with numbers and special characters:
This kind of password cracking method uses word lists in combination with numbers and special
characters:
What is a type of symmetric-key encryption algorithm that transforms a fixed-length block of plaintext …
_____________ is a type of symmetric-key encryption algorithm that transforms a fixed-length
block of plaintext (unencrypted text) data into a block of ciphertext (encrypted text) data of the
same length.
How would you accomplish this?
Your company has blocked all the ports via external firewall and only allows port 80/443 to
connect to the Internet. You want to use FTP to connect to some remote server on the Internet.
How would you accomplish this?
_________ is a tool that can hide processes from the process list, can hide files, registry entries, and inter
_________ is a tool that can hide processes from the process list, can hide files, registry entries,
and intercept keystrokes.
Which command will you run to disable auditing from the cmd?
You have successfully gained access to a victim’s computer using Windows 2003 Server SMB
Vulnerability. Which command will you run to disable auditing from the cmd?
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?
What is the BEST alternative if you discover that a rootkit has been installed on one of your
computers?