PrepAway - Latest Free Exam Questions & Answers

Tag: 312-50

Which of the following steganography utilities exploits the nature of white space and allows the user to conce

Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces?

In the context of Trojans, what is the definition of a Wrapper?

In the context of Trojans, what is the definition of a Wrapper?

Which of the following tool to grab a copy of it by sniffing?

When Jason moves a file via NFS over the company’s network, you want to grab a copy of it by sniffing. Which of the following tool accomplishes this?

How would you overcome the Firewall restriction on ICMP ECHO packets?

The traditional traceroute sends out ICMP ECHO packets with a TTL of one, and increments the TTL until the destination has been reached. By printing the gateways that generate ICMP time exceeded messages along the way, it is able to determine the path packets take to reach the destination.

The problem is that with the widespread use of firewalls on the Internet today, many of the packets that traceroute sends out end up being filtered, making it impossible to completely trace the path to the destination.

How would you overcome the Firewall restriction on ICMP ECHO packets?


Page 66 of 150« First...102030...6465666768...8090100...Last »