You are running known exploits against your network to test for possible vulnerabilities. To test the strength ofyour virus software, you load a test network to mimic your production network. Your software successfullyblocks some simple macro and encrypted viruses.
You decide to really test the software by using virus codewhere the code rewrites itself entirely and the signatures change from child to child, but the functionality staysthe same. What type of virus is this that you are testing?
Answer : A
Identify the injection attack represented in the diagram below:
Answer : C
Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly todetect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?
Answer : D
What is kept in the following directory? HKLM\SECURITY\Policy\Secrets
Answer : A
Which of the following pen testing reports provides detailed information about all the tasks performed during penetration testing?
Answer : A
A chipset is a group of integrated circuits that are designed to work together and are usually marketed as a single product.'' It is generally the motherboard chips or the chips used on the expansion card.
Which one of the following is well supported in most wireless applications?
Answer : B
Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and types in the following search.
link:www.ghttech.net
What will this search produce?
Answer : A