What are the two basic types of attacks?
What are the two basic types of attacks? (Choose two.)
Where should a security tester be looking for information that could be used by an attacker against an organiz
Where should a security tester be looking for information that could be used by an attacker against an organization? (Select all that apply)
Who is an Ethical Hacker?
Who is an Ethical Hacker?
What does the term "Ethical Hacking" mean?
What does the term “Ethical Hacking” mean?
What is the essential difference between an 'Ethical Hacker' and a 'Cracker'?
What is the essential difference between an ‘Ethical Hacker’ and a ‘Cracker’?
From the above list identify the user account with System Administrator privileges?
Peter extracts the SID list from Windows 2000 Server machine using the hacking tool “SIDExtracter”. Here is the output of the SIDs:
S-1-5-21-1125394485-807628933-549785860-100 John
-1-5-21-1125394485-807628933-549785860-652 Rebecca
-1-5-21-1125394485-807628933-549785860-412 Sheela
-1-5-21-1125394485-807628933-549785860-999 Shawn
-1-5-21-1125394485-807628933-549785860-777 Somia
-1-5-21-1125394485-807628933-549785860-500 Chang
-1-5-21-1125394485-807628933-549785860-555 Micah
From the above list identify the user account with System Administrator privileges?
Which of the following nmap commands in Linux produces the above output?
Starting nmap 3.75 ( http://www.insecure.org/nmap/ ) at 2006-09-25 00:01 EST Host 192.168.0.0 seems to be a subnet broadcast address (returned 4 extra pings).
Host 192.168.0.1 appears to be up.
MAC Address: 00:12:17:31:4F:C4 (Cisco-Linksys)
Host 192.168.0.6 appears to be up.
MAC Address: 00:C0:4F:A1:25:4A (Dell Computer)
Host 192.168.0.10 appears to be up.
MAC Address: 00:B0:D0:FE:87:68 (Dell Computer)
Host 192.168.0.13 appears to be up.
MAC Address: 00:C0:4F:A1:25:89 (Dell Computer)
Host 192.168.0.100 appears to be up.
MAC Address: 00:C0:4F:A1:27:BF (Dell Computer)
Host 192.168.0.103 appears to be up.
MAC Address: 00:0D:88:66:FB:87 (D-Link)
Host 192.168.0.104 appears to be up.
Host 192.168.0.108 appears to be up.
MAC Address: 00:11:D8:90:D6:7F (Asustek Computer)
Host 192.168.0.255 seems to be a subnet broadcast address (returned 4 extra pings).
Nmap run completed — 256 IP addresses (8 hosts up) scanned in 4.390 seconds
Which of the following nmap commands in Linux produces the above output?
Who is considered an insider?
A majority of attacks come from insiders, people who have direct access to a company’s computer system as part of their job function or a business relationship. Who is considered an insider?
Which of the following strategies can the employee use to evade detection by a network-based IDS application?
An employee wants to bypass detection by a network-based IDS application and does not want to attack the system containing the IDS application. Which of the following strategies can the employee use to evade detection by a network-based IDS application?