What organization should Frank submit the log to find out if it is a new vulnerability or not?
Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that...
An "idle" system is also referred to as what?
An "idle" system is also referred to as what?A . PC not connected to the InternetB . ZombieC . PC not being usedD . BotView AnswerAnswer: B
Area density refers to:
Area density refers to:A . the amount of data per diskB . the amount of data per partitionC . the amount of data per square inchD . the amount of data per platterView AnswerAnswer: A
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?A . Linux/Unix computers are easier to compromiseB . Linux/Unix computers are constantly talkingC . Windows computers are constantly talkingD . Windows computers will not respond to idle scansView AnswerAnswer: C
Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?
Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?A . ClosedB . OpenC ....
You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.
You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her...
After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?
Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?A . The manufacturer of the system compromisedB...
What filter should George use in Ethereal?
George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking...
What information will you be able to gather?
As a security analyst, you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company . What information will you be able to gather?A . The IP address of the employees’ computersB...
The MD5 program is used to:
The MD5 program is used to:A . wipe magnetic media before recycling itB . make directories on an evidence diskC . view graphics files on an evidence driveD . verify that a disk is not altered when you examine itView AnswerAnswer: D