Question 21

Which of the following reads and writes data across network connections by using the TCP/IP protocol?
  • Question 22

    John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?
    Each correct answer represents a complete solution. Choose all that apply.
  • Question 23

    In which of the following attacking methods does an attacker distribute incorrect IP address?
  • Question 24

    Which of the following rootkits patches, hooks, or replaces system calls with versions that hide information about the attacker?
  • Question 25

    Which of the following are the primary goals of the incident handling team?
    Each correct answer represents a complete solution. Choose all that apply.