Which system is John using to track the malicious hackers?
John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based
systems. A project has been assigned to John to track malicious hackers and to strengthen the
company’s security system. John configures a computer system to trick malicious hackers into
thinking that it is the company’s main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?
Which of the following can be used to perform session hijacking?
Which of the following can be used to perform session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
which of the following techniques does an attacker take network traffic coming towards a host at one port and
In which of the following techniques does an attacker take network traffic coming towards a host at
one port and forward it from that host to another host?
Which of the following is used to authenticate asymmetric keys?
Which of the following is used to authenticate asymmetric keys?
Which of the following programs is used for bypassing normal authentication for securing remote access to a co
Which of the following programs is used for bypassing normal authentication for securing remote
access to a computer?
which a product is identified?
Which of the following is a name, symbol, or slogan with which a product is identified?
Which of the following tools can he use to accomplish his task?
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully completed the following steps of the
preattack phase:
·Information gathering
·Determining network range
·Identifying active machines
·Finding open ports and applications
·OS fingerprinting
·Fingerprinting services
Now John wants to perform network mapping of the We-are-secure network. Which of the
following tools can he use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following attacks is John performing?
John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open
connections simultaneously so that all hosts behind it are effectively disabled. Which of the
following attacks is John performing?
Which of the following statements are correct about spoofing and session hijacking?
Which of the following statements are correct about spoofing and session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target
In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536
bytes to the target system?