Which of the following codes is used to crack Windows login passwords?
Which of the following malicious codes is used by a hacker to get control over the system files of a victim?
A ________ attack is designed to bring loss of network connectivity and services by consuming the bandwidth of a user's network.
Which of the following is used to provide a protective shield for the data passing over the Internet?
Which of the following terms is used for the process of securing a system or a device on a network infrastructure?
What is the major difference between a worm and a Trojan horse?
Which of the following standards defines wireless access for local area networking?
Which of the following protocols of the TCP/IP suite is used in the application layer of the OSI model?
Which of the following password cracking attacks is implemented by calculating all the possible hashes for a set of characters?
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is selling the garments is almost identical to the original trademark of the company. On the grounds of which of the following laws can the employee be prosecuted?
Which of the following processes is used to convert plain text into cipher text?
Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using? Each correct answer represents a part of the solution. Choose all that apply. A. Technical steganography B. Perceptual masking C. Linguistic steganography D. Text Semagrams
Which of the following techniques is used to log network traffic?
Which of the following statements is true about a honeyfarm?
Which of the following DOS commands is used to configure network protocols?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following pre-attack phases while testing the security of the server: Footprinting Scanning Now he wants to conduct the enumeration phase. Which of the following tools can John use to conduct it? Each correct answer represents a complete solution. Choose all that apply. A. PsFile B. PsPasswd C. WinSSLMiM D. UserInfo
Which of the following is an example of a worm used in the Linux operating system?
Which of the following is an example of a firewall?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He observes that the We-are-secure server is vulnerable to a special type of DoS attack and he makes the following suggestions to the security authority to protect the server from this DoS attack. The countermeasures against this type of DoS attack are as follows: Disabling IP-directed broadcasts at the We-are-secure router Configuring local computers so as not to respond to such ICMP packets that are configured to be sent to IP broadcast addresses Which of the following DoS attacks has John discovered as a vulnerability for the We-are-secure security network?
Which of the following wireless networks transmits data probably at 115 Kbps?
Click Next Button or HERE for more Questions