Question 36

Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
  • Question 37

    Which of the following viruses/worms uses the buffer overflow attack?
  • Question 38

    Which of the following programming languages are NOT vulnerable to buffer overflow attacks?
    Each correct answer represents a complete solution. Choose two.
  • Question 39

    In which of the following malicious hacking steps does email tracking come under?
  • Question 40

    John works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network of the company. On the HTTP servers of the company, John defines a rule for dropping any kind of userdefined URLs. Which of the following types of attacks can be prevented by dropping the user-defined URLs?