Question 141

Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data created by DNS cache poisoning?
  • Question 142

    Which of the following functions in c/c++ can be the cause of buffer overflow?
    Each correct answer represents a complete solution. Choose two.
  • Question 143

    Which of the following tools can be used for network sniffing as well as for intercepting conversations through session hijacking?
  • Question 144

    In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?
  • Question 145

    John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-
    secure.com. He has successfully completed the following steps of the pre-attack phase:
    * Information gathering
    * Determining network range
    * Identifying active machines
    * Finding open ports and applications
    * OS fingerprinting
    * Fingerprinting services
    Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use
    to accomplish his task?
    Each correct answer represents a complete solution. Choose all that apply.