How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?
A.
Hash value
B.
Private key
C.
Digital signature
D.
Digital certificate
Digital certificate
Clark, a professional hacker, was hired by an organization lo gather sensitive Information
about its competitors surreptitiously. Clark gathers the server IP address of the target
organization using Whole footprinting. Further, he entered the server IP address as an
input to an online tool to retrieve information such as the network range of the target
organization and to identify the network topology and operating system used in the
network. What is the online tool employed by Clark in the above scenario?
A.
AOL
B.
ARIN
C.
DuckDuckGo
D.
Baidu
DuckDuckGo
What kind of detection techniques is being used in antivirus software that identifies
malware by collecting data from multiple protected systems and instead of analyzing files
locally it’s made on the provider’s environment?
A.
Behavioral based
B.
Heuristics based
C.
Honeypot based
D.
Cloud based
Cloud based
Tess King is using the nslookup command to craft queries to list all DNS information (such
as Name Servers, host names, MX records, CNAME records, glue records (delegation for
child Domains), zone serial number, TimeToLive (TTL) records, etc) for a Domain.
What do you think Tess King is trying to accomplish? Select the best answer.
A.
A zone harvesting
B.
A zone transfer
C.
A zone update
D.
A zone estimate
A zone transfer
Which of the following incident handling process phases is responsible for defining rules,
collaborating human workforce, creating a back-up plan, and testing the plans for an organization?
A.
Preparation phase
B.
Containment phase
C.
Identification phase
D.
Recovery phase
Preparation phase
Page 15 out of 104 Pages |
Previous |