10/533 questions · Unlock full access
Q1

Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is being used by Eve?

Q2

In which of the following steps of the incident handling processes does the Incident Handler make sure that all business processes and functions are back to normal and then also wants to monitor the system or processes to ensure that the system is not compromised again?

Q3

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

Q4

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Q5

Which of the following statements about reconnaissance is true?

Q6

Fill in the blank with the appropriate word. StackGuard (as used by Immunix),ssp/ProPolice(as used by OpenBSD), and Microsoft's/GS option use_______defense against buffer overflow attacks.

Q7

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He establishes a connection to a target host running a Web service with netcat and sends a bad html request in order to retrieve information about the service on the host. Which of the following attacks is John using?

Q8Multiple answers

Many organizations create network maps of their network system to visualize the network and understand the relationship between the end devices and the transport layer that provide services. Which of the following are the techniques used for network mapping by large organizations? Each correct answer represents a complete solution. Choose three.

Q9

Which of the following methods can be used to detect session hijacking attack?

Q10

Which of the following attacks involves multiple compromised systems to attack a single target?