Question 21
Which of the following reads and writes data across network connections by using the TCP/IP protocol?
Question 22
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
Question 23
In which of the following attacking methods does an attacker distribute incorrect IP address?
Question 24
Which of the following rootkits patches, hooks, or replaces system calls with versions that hide information about the attacker?
Question 25
Which of the following are the primary goals of the incident handling team?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.