Which of the following programs is usually targeted at Microsoft Office products?
C
In an internal security audit, the white hat hacker gains control over a user account and attempts to
acquire access to another account's confidential files and information. How can he achieve this?
A
A technician is resolving an issue where a computer is unable to connect to the Internet using a
wireless access point. The computer is able to transfer files locally to other machines, but cannot
successfully reach the Internet. When the technician examines the IP address and default gateway
they are both on the 192.168.1.0/24. Which of the following has occurred?
B
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of
communication?
C
Due to a slowdown of normal network operations, the IT department decided to monitor internet
traffic for all of the employees. From a legal standpoint, what would be troublesome to take this kind
of measure?
C
Which of the following tools performs comprehensive tests against web servers, including dangerous
files and CGIs?
A
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and
Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible
breach of security. When the investigator attempts to correlate the information in all of the logs, the
sequence of many of the logged events do not match up.
What is the most likely cause?
A
DNS cache snooping is a process of determining if the specified resource address is present in the
DNS cache records. It may be useful during the examination of the network to determine what
software update resources are used, thus discovering what software is installed.
What command is used to determine if the entry is present in DNS cache?
C
Which of the following is an extremely common IDS evasion technique in the web world?
C
John the Ripper is a technical assessment tool used to test the weakness of which of the following?
A