Question 71
Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?
Question 72
Which of the following actions is performed by the netcat command given below?
nc 55555 < /etc/passwd
nc 55555 < /etc/passwd
Question 73
Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
Question 74
Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides
(possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and
keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of
identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is
being used by Eve?
(possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and
keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of
identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is
being used by Eve?
Question 75
You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company wants to fix potential vulnerabilities existing on the tested systems. You use Nessus as a vulnerability scanning program to fix the vulnerabilities. Which of the following vulnerabilities can be fixed using Nessus?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.