Which of the following worms has attacked the computer?
John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based
network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the
company complains to John that his system contains an unknown package named as tar.gz and
his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about
the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that
the other computers on the network are also facing the same problem. John discovers that a
malicious application is using the synscan tool to randomly generate IP addresses.
Which of the following worms has attacked the computer?
Which two technologies should research groups use for secure VPN access while traveling?
Which two technologies should research groups use for secure VPN access while traveling?
(Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose two.
Which of the following are the most likely threats to his computer?
Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection
using his computer running on Windows XP operating system. Which of the following are the most
likely threats to his computer?
Each correct answer represents a complete solution. Choose two.
Which of the following uses public key cryptography to encrypt the contents of files?
Which of the following uses public key cryptography to encrypt the contents of files?
Which of the following softwares is used to perform constant monitoring of the network infrastructure?
Which of the following softwares is used to perform constant monitoring of the network
infrastructure?
Which of the following actions will you perform to accomplish the task?
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server
2008 network environment. The network is configured as a Windows Active Directory-based single
forest domain-based network. The company has recently provided fifty laptops to its sales team
members. You are required to configure an 802.11 wireless network for the laptops. The sales
team members must be able to use their data placed at a server in a cabled network. The planned
network should be able to handle the threat of unauthorized access and data interception by an
unauthorized user. You are also required to prevent the sales team members from communicating
directly to one another. Which of the following actions will you perform to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements are true about session hijacking?
Which of the following statements are true about session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following Linux rootkits allows attackers to hide files, processes, and network connections?
Which of the following Linux rootkits allows attackers to hide files, processes, and network
connections?
Each correct answer represents a complete solution. Choose all that apply.
Who among the following are security experts who specialize in penetration testing and other testing methodolo
Who among the following are security experts who specialize in penetration testing and other
testing methodologies to ensure that their company’s information systems are secure?
Each correct answer represents a complete solution. Choose all that apply.
you need to conduct to resolve the problem?
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network.
John complains to you that his computer is not working properly. What type of security audit do
you need to conduct to resolve the problem?