Question 221

Which of the following are the automated tools that are used to perform penetration testing?
Each correct answer represents a complete solution. Choose two.
  • Question 222

    Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach in security to his senior members, stating that "security defenses has been breached and exploited for 2 weeks by hackers." The hackers had accessed and downloaded 50,000 addresses containing customer credit cards and passwords. Umbrella Technology was looking to law enforcement officials to protect their intellectual property.
    The intruder entered through an employee's home machine, which was connected to Umbrella Technology's corporate VPN network. The application called BEAST Trojan was used in the attack to open a "back door" allowing the hackers undetected access. The security breach was discovered when customers complained about the usage of their credit cards without their knowledge.
    The hackers were traced back to Shanghai, China through e-mail address evidence. The credit card information was sent to that same e-mail address. The passwords allowed the hackers to access Umbrella Technology's network from a remote location, posing as employees.
    Which of the following actions can Adam perform to prevent such attacks from occurring in future?
  • Question 223

    Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to
    information or services in a computer system?
  • Question 224

    John works as a Network Security Professional. He is assigned a project to test the security of
    www.we-are-secure.com. He establishes a connection to a target host running a Web service with netcat and sends a bad html request in order to retrieve information about the service on the host.

    Which of the following attacks is John using?
  • Question 225

    Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?