Question 91
Which of the following takes control of a session between a server and a client using TELNET, FTP, or any other non-encrypted TCP/IP utility?
Question 92
Which of the following tools can be used to perform brute force attack on a remote database?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
Question 93
John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the
We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the
server log files?
We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the
server log files?
Question 94
Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?
Question 95
You execute the following netcat command:
c:\target\nc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?
c:\target\nc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?