Question 36
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
Question 37
Which of the following viruses/worms uses the buffer overflow attack?
Question 38
Which of the following programming languages are NOT vulnerable to buffer overflow attacks?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
Question 39
In which of the following malicious hacking steps does email tracking come under?
Question 40
John works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network of the company. On the HTTP servers of the company, John defines a rule for dropping any kind of userdefined URLs. Which of the following types of attacks can be prevented by dropping the user-defined URLs?