Question 11

As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com. Which of the following nmap switches have you used to accomplish the task?
  • Question 12

    Which of the following Linux rootkits allows an attacker to hide files, processes, and network connections?
    Each correct answer represents a complete solution. Choose all that apply.
  • Question 13

    Which of the following reads and writes data across network connections by using the TCP/IP protocol?
  • Question 14

    Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf("%s", str).
    What attack will his program expose the Web application to?
  • Question 15

    You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. You want to
    use a scanning technique which works as a reconnaissance attack. The technique should direct to a specific host or
    network to determine the services that the host offers.
    Which of the following scanning techniques can you use to accomplish the task?