statement below is true?
Bob received this text message on his mobile phone: “Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: [email protected]”. Which statement below is true?A . This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.B...
Which DNS resource record can indicate how long any "DNS poisoning" could last?
Which DNS resource record can indicate how long any "DNS poisoning" could last?A . MXB . SOAC . NSD . TIMEOUTView AnswerAnswer: B
Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?
Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?A . LinuxB . UnixC . OS XD . WindowsView AnswerAnswer: D
If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?
If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?A . BirthdayB . Brute forceC . Man-in-the-middleD . SmurfView AnswerAnswer: B
Which of the following tools are used for enumeration? (Choose three.)
Which of the following tools are used for enumeration? (Choose three.)A . SolarWindsB . USER2SIDC . CheopsD . SID2USERE . DumpSecView AnswerAnswer: B,D,E
What is the most likely cause?
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the...
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?A . KismetB . AbelC . NetstumblerD . NessusView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Kismet_(software) Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work...
Which of the following represents the initial two commands that an IRC client sends to join an IRC network?
Which of the following represents the initial two commands that an IRC client sends to join an IRC network?A . USER, NICKB . LOGIN, NICKC . USER, PASSD . LOGIN, USERView AnswerAnswer: A
Which tool can be used to perform session splicing attacks?
Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?A . tcpspliceB . BurpC . HydraD...
Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?
Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?A . Macro virusB . Stealth/Tunneling virusC . Cavity virusD . Polymorphic virusView AnswerAnswer: B