Question 66
What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?
Question 67
You have compromised a server and successfully gained a root access.
You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System.
What is the best approach?
You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System.
What is the best approach?
Question 68
Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the Information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?
Question 69
As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing.
What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?
What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?
Question 70
In Trojan terminology, what is a covert channel?

