Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?
Answer : A
You run the following command while using Nikto Web scanner:
perl nikto.pl -h 192.168.0.1 -p 443
What action do you want to perform?
Answer : D
Adam works as an Incident Handler for Umbrella Inc. His recent actions towards the incident are not up to the standard norms of the company. He always forgets some steps and procedures while handling responses as they are very hectic to perform.
Which of the following steps should Adam take to overcome this problem with the least administrative effort?
Answer : C
You work as a System Engineer for Cyber World Inc. Your company has a single Active server role has been installed on one of the servers, namely uC1. uC1 hosts twelve virtual machines. You have been given the task to configure the Shutdown option for uC1, so that each virtual machine shuts down before the main Hyper-V server shuts down.
Which of the following actions will you perform to accomplish the task?
Answer : A
Which of the following types of attack can guess a hashed password?
Answer : A
In which of the following scanning methods do Windows operating systems send only RST packets irrespective of whether the port is open or closed?
Answer : A
Which of the following commands is used to access Windows resources from Linux workstation?
Answer : D
Which of the following functions can be used as a countermeasure to a Shell Injection attack?
Each correct answer represents a complete solution. Choose all that apply.
Answer : A,D
Which of the following types of attacks is the result of vulnerabilities in a program due to poor programming techniques?
Answer : D
You see the career section of a company's Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?
Answer : C
Which of the following applications is an example of a data-sending Trojan?
Answer : D
In which of the following attacking methods does an attacker distribute incorrect IP address?
Answer : C
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site.
The we-are-secure login page is vulnerable to a __________.
Answer : B
Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?
Answer : A
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We- are-secure server. The output of the scanning test is as follows:
C:\whisker.pl -h target_IP_address
-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =
= Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv
John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the
We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?
Each correct answer represents a complete solution. Choose all that apply.
Answer : A,C,D
Have any questions or issues ? Please dont hesitate to contact us