How will you accomplish this?

You want to hide a secret.txt document inside c:windowssystem32tcpip.dll kernel library using ADS streams. How will you accomplish this?A . copy secret.txt c:windowssystem32tcpip.dll kernel>secret.txtB . copy secret.txt c:windowssystem32tcpip.dll: secret.txtC . copy secret.txt c:windowssystem32tcpip.dll |secret.txtD . copy secret.txt >< c:windowssystem32tcpip.dll kernel secret.txtView AnswerAnswer: B

January 15, 2021 No Comments READ MORE +

What is a sniffing performed on a switched network called?

What is a sniffing performed on a switched network called?A . Spoofed sniffingB . Passive sniffingC . Direct sniffingD . Active sniffingView AnswerAnswer: D

January 15, 2021 No Comments READ MORE +

What display filter should you use that shows all TCP packets that contain the word 'facebook'?

You want to capture Facebook website traffic in Wireshark. What display filter should you use that shows all TCP packets that contain the word 'facebook'?A . display==facebookB . traffic.content==facebookC . tcp contains facebookD . list.display.facebookView AnswerAnswer: C

January 14, 2021 No Comments READ MORE +

What kind of attack is being illustrated here?

Jack Hacker wants to break into Brown Co.'s computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to verify...

January 14, 2021 No Comments READ MORE +

Choose one of the following pseudo codes to describe this statement:

Choose one of the following pseudo codes to describe this statement: "If we have written 200 characters to the buffer variable, the stack should stop because it cannot hold any more data."A . If (I > 200) then exit (1)B . If (I < 200) then exit (1)C . If...

January 14, 2021 No Comments READ MORE +

Which statement correctly defines this term?

One of the effective DoS/DDoS countermeasures is 'Throttling'. Which statement correctly defines this term?A . Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to processB . Providers can increase the bandwidth on critical connections to prevent...

January 14, 2021 No Comments READ MORE +

How do you deal with these threats?

Most cases of insider abuse can be traced to individuals who are introverted, incapable of dealing with stress or conflict, and frustrated with their job, office politics, and lack of respect or promotion. Disgruntled employees may pass company secrets and intellectual property to competitors for monitory benefits. Here are some...

January 14, 2021 No Comments READ MORE +

This attack uses social engineering techniques to trick users into accessing a fake Web site and divulging personal information. Attackers send a legitimate-looking e-mail asking users to update their information on the company's Web site, but the URLs in the e-mail actually point to a false Web site.

This attack uses social engineering techniques to trick users into accessing a fake Web site and divulging personal information. Attackers send a legitimate-looking e-mail asking users to update their information on the company's Web site, but the URLs in the e-mail actually point to a false Web site.A . Wiresharp...

January 14, 2021 No Comments READ MORE +

What file system vulnerability does the following command take advantage of?

What file system vulnerability does the following command take advantage of? type c:anyfile.exe > c:winntsystem32calc.exe: anyfile.exeA . HFSB . Backdoor accessC . XFSD . ADSView AnswerAnswer: D

January 13, 2021 No Comments READ MORE +