PrepAway - Latest Free Exam Questions & Answers

Tag: Exam ECSS

Which system is John using to track the malicious hackers?

John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based
systems. A project has been assigned to John to track malicious hackers and to strengthen the
company’s security system. John configures a computer system to trick malicious hackers into
thinking that it is the company’s main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?

Which of the following tools can he use to accomplish his task?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully completed the following steps of the
preattack phase:
·Information gathering
·Determining network range
·Identifying active machines
·Finding open ports and applications
·OS fingerprinting
·Fingerprinting services
Now John wants to perform network mapping of the We-are-secure network. Which of the
following tools can he use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.


Page 5 of 28« First...34567...1020...Last »