Which of the following mistakes made by Jason helped the Forensic Investigators catch him?
Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking
on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based
network. Jason successfully enters the target system remotely by using the advantage of
vulnerability. He places a Trojan to maintain future access and then disconnects the remote session.
The employees of the company complain to Mark, who works as a Professional Ethical Hacker for
DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that
some irrelevant log files and signs of Trojans are present on the computers. He suspects that a
malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and
catches Jason.
Which of the following mistakes made by Jason helped the Forensic Investigators catch him?
Which of the following are pre-requisites for an attacker to conduct firewalking?
Firewalking is a technique that can be used to gather information about a remote network
protected by a firewall. This technique can be used effectively to perform information gathering
attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire
one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following malicious codes is used by a hacker to get control over the system files of a victim?
Which of the following malicious codes is used by a hacker to get control over the system files of a
victim?
Which of the following processes is used by hackers to find information about the target system?
Which of the following processes is used by hackers to find information about the target system?
Which of the following is provided by Digital signatures?
Which of the following is provided by Digital signatures?
What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?
What is the name of the first computer virus that infected the boot sector of the MS-DOS operating
system?
Which of the following is an example of a worm used in the Linux operating system?
Which of the following is an example of a worm used in the Linux operating system?
Which of the following laws was formed by the legislative branch of the United States government?
Which of the following laws was formed by the legislative branch of the United States
government?
Which of the following protocols of the TCP/IP suite is used in the application layer of the OSI model?
Which of the following protocols of the TCP/IP suite is used in the application layer of the OSI model?
Which of the following standards defines wireless access for local area networking?
Which of the following standards defines wireless access for local area networking?