A virus that attempts to install itself inside the file it is infecting is called?

A virus that attempts to install itself inside the file it is infecting is called?A . Tunneling virusB . Cavity virusC . Polymorphic virusD . Stealth virusView AnswerAnswer: B

October 21, 2020 No Comments READ MORE +

Which of the following solution will you suggest?

You find that it is a CnC communication. Which of the following solution will you suggest?A . Block the Blacklist IP’s @ FirewallB . Update the Latest Signatures on your IDS/IPSC . Clean the Malware which are trying to Communicate with the External Blacklist IP’sD . Both B and CView...

October 20, 2020 No Comments READ MORE +

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?A . Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.B . Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.C ....

October 20, 2020 No Comments READ MORE +

Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?

Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?A . Bootrom ExploitB . iBoot ExploitC . Sandbox ExploitD . Userland ExploitView AnswerAnswer: D

October 20, 2020 No Comments READ MORE +

Which one of the following tools the hacker probably used to inject HTML code?

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections. When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML...

October 20, 2020 No Comments READ MORE +

Based on the below log, which of the following sentences are true?

Based on the below log, which of the following sentences are true? Mar 1, 2016, 7:33:28 AM 10.240.250.23 C 54373 10.249.253.15 C 22 tcp_ipA . SSH communications are encrypted it’s impossible to know who is the client or the serverB . Application is FTP and 10.240.250.23 is the client and...

October 20, 2020 No Comments READ MORE +

Code injection is a form of attack in which a malicious user:

Code injection is a form of attack in which a malicious user:A . Inserts text into a data field that gets interpreted as codeB . Gets the server to execute arbitrary code using a buffer overflowC . Inserts additional code into the JavaScript running in the browserD . Gains access...

October 20, 2020 No Comments READ MORE +

What is the fastest way she can accomplish this with Nmap?

Trinity needs to scan all hosts on a /16 network for TCP port 445 only. What is the fastest way she can accomplish this with Nmap? Stealth is not a concern.A . nmap -sn -sF 10.1.0.0/16 445B . nmap -p 445 -n -T4 Copen 10.1.0.0/16C . nmap -s 445 -sU...

October 20, 2020 No Comments READ MORE +

When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?

When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?A . Data items and vulnerability scanningB . Interviewing employees and network...

October 20, 2020 No Comments READ MORE +

What would you enter, if you wanted to perform a stealth scan using Nmap?

What would you enter, if you wanted to perform a stealth scan using Nmap?A . nmap -sUB . nmap -sSC . nmap -sMD . nmap -sTView AnswerAnswer: B

October 20, 2020 No Comments READ MORE +