Which of the following Trojans is used by attackers to modify the Web browser settings?
Which of the following Trojans is used by attackers to modify the Web browser settings?
Which of the following type of witnesses is a lay witness?
Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He
is working on a case of a cyber crime. Peter knows that the good investigative report should not
only communicate the relevant facts, but also present expert opinion. This report should not
include the cases in which the expert acted as a lay witness. Which of the following type of
witnesses is a lay witness?
Which of the following is a valid IP address for class B Networks?
Which of the following is a valid IP address for class B Networks?
Which of the following operating systems can be easily identified with the help of TCP FIN scanning?
TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to
the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the
attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be
ignored and the port will drop the packet. Which of the following operating systems can be easily
identified with the help of TCP FIN scanning?
Which of the following is the correct order for searching data on a Windows based system?
Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to
investigate the computer of an employee, who is suspected for classified data theft. Suspect’s
computer runs on Windows operating system. Peter wants to collect data and evidences for
further analysis. He knows that in Windows operating system, the data is searched in pre-defined
steps for proper and efficient analysis. Which of the following is the correct order for searching
data on a Windows based system?
________ takes best advantage of an existing authenticated connection
Fill in the blank with the appropriate name of the attack.
________ takes best advantage of an existing authenticated connection
Which of the following tools is John using to crack the wireless encryption keys?
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The
description of the tool is as follows:
Which of the following tools is John using to crack the wireless encryption keys?
Secure Socket Layer (SSL) operates at the________ layer of the OSI model.
Fill in the blank with the appropriate layer name of the OSI model.
Secure Socket Layer (SSL) operates at the________ layer of the OSI model.
which of the following laws can the employee be prosecuted?
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United
States. A project has been assigned to him to investigate a case of a disloyal employee who is
suspected of stealing design of the garments, which belongs to the company and selling those
garments of the same design under different brand name. Adam investigated that the company
does not have any policy related to the copy of design of the garments. He also investigated that
the trademark under which the employee is selling the garments is almost identical to the original
trademark of the company. On the grounds of which of the following laws can the employee be
prosecuted?
which is used to authenticate the bitstream images?
Which of the following algorithms produces a digital signature which is used to authenticate the bitstream images?