Question 51
You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for.
Which of the below scanning technique will you use?
Which of the below scanning technique will you use?
Question 52
When analyzing logs, it is important that the clocks on the devices on the network are synchronized. Which protocol will help in synchronizing these clocks?
Question 53
You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protected. What are two common methods used by password cracking software that you can use to obtain the password?
Question 54
What does the bytes 0x0B-0x53 represent in the boot sector of NTFS volume on Windows 2000?
Question 55
In Microsoft file structures, sectors are grouped together to form:
