What is the following command used for?
net use \targetipc$ "" /u:""
A.
Grabbing the etc/passwd file
B.
Grabbing the SAM
C.
Connecting to a Linux computer through Samba.
D.
This command is used to connect as a null session
E.
Enumeration of Cisco routers
This command is used to connect as a null session
A hacker is an intelligent individual with excellent computer skills and the ability to explore a
computer’s software and hardware without the owner’s permission. Their intention can
either be to simply gain knowledge or to illegally make changes.
Which of the following class of hacker refers to an individual who works both offensively
and defensively at various times?
A.
White Hat
B.
Suicide Hacker
C.
Gray Hat
D.
Black Hat
Gray Hat
These hackers have limited or no training and know how to use only basic techniques or
tools.
What kind of hackers are we talking about?
A.
Black-Hat Hackers A
B.
Script Kiddies
C.
White-Hat Hackers
D.
Gray-Hat Hacker
White-Hat Hackers
Which of the following steps for risk assessment methodology refers to vulnerability identification?
A.
Determines if any flaws exist in systems, policies, or procedures
B.
Assigns values to risk probabilities; Impact values.
C.
Determines risk probability that vulnerability will be exploited (High. Medium, Low)
D.
Identifies sources of harm to an IT system. (Natural, Human. Environmental)
Determines risk probability that vulnerability will be exploited (High. Medium, Low)
Boney, a professional hacker, targets an organization for financial benefits. He performs an
attack by sending his session ID using an MITM attack technique. Boney first obtains a
valid session ID by logging into a service and later feeds the same session 10 to the target
employee. The session ID links the target employee to Boneys account page without
disclosing any information to the victim. When the target employee clicks on the link, all the
sensitive payment details entered in a form are linked to Boneys account. What is the
attack performed by Boney in the above scenario?
A.
Session donation attack
B.
Session fixation attack
C.
Forbidden attack
D.
CRIME attack
Session donation attack
Page 20 out of 104 Pages |
Previous |