Question 101

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's
password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
  • Question 102

    Maria works as a professional Ethical Hacker. She recently got a project to test the security of www.we-are-secure.com.
    Arrange the three pre-test phases of the attack to test the security of weare-secure.

    Question 103

    US Garments wants all encrypted data communication between corporate office and remote location.
    They want to achieve following results:
    l Authentication of users

    l Anti-replay

    l Anti-spoofing

    l IP packet encryption

    They implemented IPSec using Authentication Headers (AHs). Which results does this solution provide?
    Each correct answer represents a complete solution. Choose all that apply.
  • Question 104

    Adam works as a sales manager for Umbrella Inc. He wants to download software from the Internet. As the software comes from a site in his untrusted zone, Adam wants to ensure that the downloaded software has not been Trojaned. Which of the following options would indicate the best course of action for Adam?
  • Question 105

    Which of the following is a method of gaining access to a system that bypasses normal
    authentication?