Question 176
Sniffers that place NICs in promiscuous mode work at what layer of the OSI model?
Question 177
Andie, a network administrator, suspects unusual network services running on a windows system. Which of the following commands should he use to verify unusual network services started on a Windows system?
Question 178
During an investigation, an employee was found to have deleted harassing emails that were sent to someone else. The company was using Microsoft Exchange and had message tracking enabled. Where could the investigator search to find the message tracking log file on the Exchange server?
Question 179
What will the following command accomplish?
dd if=/dev/xxx of=mbr.backup bs=512 count=1
dd if=/dev/xxx of=mbr.backup bs=512 count=1
Question 180
What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = '[email protected]'; DROP TABLE members; --'
