Question 11

Which definition among those given below best describes a covert channel?
  • Question 12

    During a blackbox pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded.
    What type of firewall is inspecting outbound traffic?
  • Question 13

    What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?
  • Question 14

    To maintain compliance with regulatory requirements, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such an audit?
  • Question 15

    You have initiated an active operating system fingerprinting attempt with nmap against a target system:

    What operating system is the target host running based on the open ports shown above?