PrepAway - Latest Free Exam Questions & Answers

Category: 312-50v8

Exam 312-50v8: Certified Ethical Hacker (v8)

What can Joe do to hide the wiretap program from being detected by ifconfig command?

Joe the Hacker breaks into XYZ’s Linux system and plants a wiretap program in order to sniff
passwords and user accounts off the wire. The wiretap program is embedded as a Trojan horse in
one of the network utilities. Joe is worried that network administrator might detect the wiretap
program by querying the interfaces to see if they are running in promiscuous mode.

What can Joe do to hide the wiretap program from being detected by ifconfig command?


Page 60 of 88« First...102030...5859606162...7080...Last »