logo

Crowdly

[24-25] Security Audit and Ethical Hacking - Part 1 [2C]

Looking for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] test answers and solutions? Browse our comprehensive collection of verified answers for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] at moodle.esme.fr.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes?
0%
0%
0%
0%
100%
View this question
An ethical hacker is ACK scanning against a network segment he knows is sitting behind a stateful firewall. If a scan packet receives no response, what does that indicate?
0%
0%
100%
0%
View this question
You are port scanning a system and begin sending TCp packets with the FIN flag set. A response from the host on a particular port comes back as RST/ACK. Which of the following is a true statement regarding the response?
0%
0%
0%
100%
View this question
Destination unreachable administratively prohibited messages can inform the hacker to what?
100%
0%
0%
0%
View this question
You've decided  to begin scanning  against a target organization but want to keep your efforts as quiet as possible.  Which IDS evasion technique splits the TCp header among multiple packets?
0%
0%
0%
100%
View this question
Ioe is a security engineer for a firm. His company downsizes, and Ioe discovers he will be laid off within a short amount of time. Ioe plants viruses and sets about destroying data and settings throughout the network, with no regard to being caught. Which type of hacker is Ioe considered to be?
0%
0%
100%
0%
View this question
An attacker performs a whois search against a target organization and discovers the technical point of contact and site ownership e-mail addresses. He then crafts an e-mail to the owner from the technical POC, with instructions to click a link to see web statistics for the site. Instead, the link goes to a fake site where credentials are stolen. Which attack has taken place?
0%
0%
100%
0%
View this question
You are examining IDS logs and come across the following  entry:Mar 30 10:31:07 [1123}: IDS1661/NOPS-x86: 64.118.55.64:1146 -> 192.168.119.56:53What can you infer from this log entry?
0%
0%
0%
100%
View this question
Which Google hack would display all pages that have the words SQL and Version in their titles?
0%
100%
0%
View this question
Which of the following is not considered an example of data hiding?
0%
0%
0%
100%
View this question

Want instant access to all verified answers on moodle.esme.fr?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!