logo

Crowdly

Browser

Add to Chrome

[24-25] Security Audit and Ethical Hacking - Part 1 [2C]

Looking for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] test answers and solutions? Browse our comprehensive collection of verified answers for [24-25] Security Audit and Ethical Hacking - Part 1 [2C] at moodle.esme.fr.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Ioe is a security engineer for a firm. His company downsizes, and Ioe discovers he will be laid off within a short amount of time. Ioe plants viruses and sets about destroying data and settings throughout the network, with no regard to being caught. Which type of hacker is Ioe considered to be?
0%
0%
0%
100%
View this question
An attacker performs a whois search against a target organization and discovers the technical point of contact and site ownership e-mail addresses. He then crafts an e-mail to the owner from the technical POC, with instructions to click a link to see web statistics for the site. Instead, the link goes to a fake site where credentials are stolen. Which attack has taken place?
0%
0%
100%
0%
View this question
You are examining IDS logs and come across the following  entry:Mar 30 10:31:07 [1123}: IDS1661/NOPS-x86: 64.118.55.64:1146 -> 192.168.119.56:53What can you infer from this log entry?
100%
0%
0%
0%
View this question
Which Google hack would display all pages that have the words SQL and Version in their titles?
86%
14%
0%
View this question
Which of the following is not considered an example of data hiding?
0%
0%
100%
0%
View this question
An SOA record gathered from a zone transfer is shown here:@ IN SOA DNSRV.lab.com. postmaster.lab.com. (4 ; serial number3600 ; refresh [1h] 600 ; retry [10m]86400 ; expire [1d]3600 ) ; min TTL [1h] What is the name of the authoritative DNS server for the domain, and how often will secondary servers check in for updates?
20%
0%
0%
80%
View this question
What is the primary objective of data classification schemes?
0%
0%
100%
0%
View this question
Which of the following ICMP message types are used for destinations unreachables?
0%
0%
0%
0%
0%
View this question
If a security mechanism offers availability, then it offers a high level of assurance that authorized subjects can _____________________ the data, objects, and resources.
0%
0%
0%
100%
View this question
You're using Nmap to run port scans. What syntax will attempt a half-open scan as stealthily as possible?
0%
0%
0%
0%
View this question

Want instant access to all verified answers on moodle.esme.fr?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome