Question 66

What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?
  • Question 67

    You have compromised a server and successfully gained a root access.
    You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System.
    What is the best approach?
  • Question 68

    Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the Information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?
  • Question 69

    As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing.
    What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?
  • Question 70

    In Trojan terminology, what is a covert channel?