Question 26

Which definition among those given below best describes a covert channel?
  • Question 27

    Ricardo has discovered the username for an application in his targets environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application, what type of attack is Ricardo performing?
  • Question 28

    An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security.
    When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.
    What is the most likely cause?
  • Question 29

    Thomas, a cloud security professional, is performing security assessment on cloud services to identify any loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is reallocated to new clients or businesses that use it as an laaS.
    What is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above scenario?
  • Question 30

    What would be the purpose of running "wget 192.168.0.15 -q -S" against a web server?