Question 71

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?
  • Question 72

    Which of the following actions is performed by the netcat command given below?
    nc 55555 < /etc/passwd
  • Question 73

    Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?
    Each correct answer represents a complete solution. Choose all that apply.
  • Question 74

    Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides
    (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and
    keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of
    identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is
    being used by Eve?
  • Question 75

    You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company wants to fix potential vulnerabilities existing on the tested systems. You use Nessus as a vulnerability scanning program to fix the vulnerabilities. Which of the following vulnerabilities can be fixed using Nessus?
    Each correct answer represents a complete solution. Choose all that apply.