Which of the following tools can be used to perform session splicing attacks?

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small-sized packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack signatures of such attacks. Which of the following tools can be used to perform session splicing attacks? Each correct answer represents a … Read more

Where there is significant color transition?

An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition? Question: Where there is significant color transition? Options: Soften Rotate Sharpen … Read more

Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?

Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords? Question: Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords? Options: Rainbow attack Brute Force attack Dictionary attack Hybrid attack Correct Answer The Correct Answer for … Read more

Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system?

Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system? Question: Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all … Read more

Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?

Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack? Question: Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack? Options: Dash (-) Double quote (“) Single quote (‘) Semi colon (;) Correct Answer … Read more

Which of the following tools will you use to accomplish the task?

You want to add a netbus Trojan in the chess.exe game program so that you can gain remote access to a friend’s computer. Which of the following tools will you use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. Question: Which of the following tools will you use … Read more

Which of the following is used to determine the range of IP addresses that are mapped to a live hosts?

Which of the following is used to determine the range of IP addresses that are mapped to a live hosts? Question: Which of the following is used to determine the range of IP addresses that are mapped to a live hosts? Options: Port sweep Ping sweep IP sweep Telnet sweep Correct Answer The Correct Answer … Read more

What will Mark do to protect the client computers from malware?

Mark works as aNetwork Administrator for NetTech Inc.The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware? … Read more

Which of the following attacks best describes the attacker’s intentions?

Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker’s intentions? Question: Which of … Read more

Which of the following types of attacks can be prevented by dropping the user-defined URLs?

John works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network of the company. On the HTTP servers of the company, John defines a rule for dropping any kind of userdefined URLs. Which of the following types of … Read more