What privilege level does a rootkit require to infect successfully on a Victim's machine?

A rootkit is a collection of tools (programs) that enable administrator-level access to a computer. This program hides itself deep into an operating system for malicious activity and is extremely difficult to detect. The malicious software operates in a stealth fashion by hiding its files, processes and registry keys and...

January 28, 2021 No Comments READ MORE +

What type of attack is shown in the following diagram?

What type of attack is shown in the following diagram? A . Man-in-the-Middle (MiTM) AttackB . Session Hijacking AttackC . SSL Spoofing AttackD . Identity Stealing AttackView AnswerAnswer: A

January 28, 2021 No Comments READ MORE +

Which type of hacker represents the highest risk to your network?

Which type of hacker represents the highest risk to your network?A . black hat hackersB . grey hat hackersC . disgruntled employeesD . script kiddiesView AnswerAnswer: C

January 27, 2021 No Comments READ MORE +

How would you prevent Google from storing your search keywords?

Google uses a unique cookie for each browser used by an individual user on a computer. This cookie contains information that allows Google to identify records about that user on its database. This cookie is submitted every time a user launches a Google search, visits a site using AdSense etc....

January 27, 2021 No Comments READ MORE +

Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem?

An attacker has successfully compromised a remote computer. Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem?A . Install patchesB . Setup a backdoorC . Install a zombie for...

January 27, 2021 No Comments READ MORE +

Which of the following nmap command did you run?

You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server information from services running on ports 21, 110 and 123. Here is the output of your scan results: Which of the following nmap command did you run?A . nmap -A -sV -p21, 110, 123 10.0.0.5B . nmap -F...

January 27, 2021 No Comments READ MORE +

You just purchased the latest DELL computer, which comes pre-installed with Windows 7, McAfee antivirus software and a host of other applications. You want to connect Ethernet wire to your cable modem and start using the computer immediately. Windows is dangerously insecure when unpacked from the box, and there are a few things that you must do before you use it.

You just purchased the latest DELL computer, which comes pre-installed with Windows 7, McAfee antivirus software and a host of other applications. You want to connect Ethernet wire to your cable modem and start using the computer immediately. Windows is dangerously insecure when unpacked from the box, and there are...

January 27, 2021 No Comments READ MORE +

TCP/IP Session Hijacking is carried out in which OSI layer?

TCP/IP Session Hijacking is carried out in which OSI layer?A . Datalink layerB . Transport layerC . Network layerD . Physical layerView AnswerAnswer: B

January 27, 2021 No Comments READ MORE +

How do you ensure if the e-mail is authentic and sent from fedex.com?

A common technique for luring e-mail users into opening virus-launching attachments is to send messages that would appear to be relevant or important to many of their potential recipients. One way of accomplishing this feat is to make the virus-carrying messages appear to come from some type of business entity...

January 27, 2021 No Comments READ MORE +

How would you detect IP spoofing?

Cyber Criminals have long employed the tactic of masking their true identity. In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine, by "spoofing" the IP address of that machine. How would...

January 26, 2021 No Comments READ MORE +