What are two common methods used by password cracking software that you can use to obtain the password?

You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protected .

What are two common methods used by password cracking software that you can use to obtain the password?
A . Limited force and library attack
B . Brute Force and dictionary Attack
C . Maximum force and thesaurus Attack
D . Minimum force and appendix Attack

Answer: B

Why would you want to initiate a DoS attack on a system you are testing?

You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network .

Why would you want to initiate a DoS attack on a system you are testing?
A . Show outdated equipment so it can be replaced
B . List weak points on their network
C . Use attack as a launching point to penetrate deeper into the network
D . Demonstrate that no system can be protected against DoS attacks

Answer: B

What is he testing at this point?

Kyle is performing the final testing of an application he developed for the accounting department.

His last round of testing is to ensure that the program is as secure as possible. Kyle runs the following command .

What is he testing at this point?

#include #include int main(int argc, char

*argv[]) { char buffer[10]; if (argc < 2) { fprintf (stderr, "USAGE: %s stringn", argv[0]); return 1; }

strcpy(buffer, argv[1]); return 0; }
A . Buffer overflow
B . SQL injection
C . Format string bug
D . Kernal injection

Answer: A

Which organization coordinates computer crimes investigations throughout the United States?

Jason is the security administrator of ACMA metal Corporation. One day he notices the company’s Oracle database server has been compromised and the customer information along with financial data has been stolen. The financial loss will be in millions of dollars if the database gets into the hands of the competitors. Jason wants to report this crime to the law enforcement agencies immediately.

Which organization coordinates computer crimes investigations throughout the United States?
A . Internet Fraud Complaint Center
B . Local or national office of the
D . Secret Service
E . National Infrastructure Protection Center
F . CERT Coordination Center

Answer: B

In the context of file deletion process, which of the following statement holds true?

In the context of file deletion process, which of the following statement holds true?
A . When files are deleted, the data is overwritten and the cluster marked as available
B . The longer a disk is in use, the less likely it is that deleted files will be overwritten
C . While booting, the machine may create temporary files that can delete evidence
D . Secure delete programs work by completely overwriting the file in one go

Answer: C