Question 176

Sniffers that place NICs in promiscuous mode work at what layer of the OSI model?
  • Question 177

    Andie, a network administrator, suspects unusual network services running on a windows system. Which of the following commands should he use to verify unusual network services started on a Windows system?
  • Question 178

    During an investigation, an employee was found to have deleted harassing emails that were sent to someone else. The company was using Microsoft Exchange and had message tracking enabled. Where could the investigator search to find the message tracking log file on the Exchange server?
  • Question 179

    What will the following command accomplish?
    dd if=/dev/xxx of=mbr.backup bs=512 count=1
  • Question 180

    What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = '[email protected]'; DROP TABLE members; --'