What should the administrator do next?
Employees in a company are no longer able to access Internet web sites on their computers. The
network administrator is able to successfully ping IP address of web servers on the Internet and is
able to open web sites by using an IP address in place of the URL. The administrator runs the
nslookup command for www.eccouncil.org and receives an error message stating there is no
response from the server. What should the administrator do next?
Which initial procedure should an ethical hacker perform after being brought into an organization?
Which initial procedure should an ethical hacker perform after being brought into an organization?
Which of the following guidelines or standards is associated with the credit card industry?
Which of the following guidelines or standards is associated with the credit card industry?
Which of the attacks below is likely to be used to crack the target file?
An attacker has captured a target file that is encrypted with public key cryptography. Which of
the attacks below is likely to be used to crack the target file?
Which tool can be used to silently copy files from USB devices?
Which tool can be used to silently copy files from USB devices?
How can a rootkit bypass Windows 7 operating system’s kernel mode, code signing policy?
How can a rootkit bypass Windows 7 operating system’s kernel mode, code signing policy?
What is the first step that the bank should take before enabling the audit feature?
A bank stores and processes sensitive privacy information related to home loans. However,
auditing has never been enabled on the system. What is the first step that the bank should take
before enabling the audit feature?
What is the consultant’s obligation to the financial organization?
A consultant has been hired by the V.P. of a large financial organization to assess the company’s
security posture. During the security testing, the consultant comes across child pornography on
the V.P.’s computer. What is the consultant’s obligation to the financial organization?
How is sniffing broadly categorized?
How is sniffing broadly categorized?
Which command would the engineer use to accomplish this?
An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The
engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would
the engineer use to accomplish this?