An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site. Which file does the attacker need to modify?
A.
Boot.ini
B.
Sudoers
C.
Networks
D.
Hosts
Hosts
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
A.
ESP transport mode
B.
ESP confidential
C.
AH permiscuous
D.
AH Tunnel mode
ESP transport mode
Steve, an attacker, created a fake profile on a social media website and sent a request to
Stella. Stella was enthralled by Steve's profile picture and the description given for his
profile, and she initiated a conversation with him soon after accepting the request. After a
few days. Sieve started asking about her company details and eventually gathered all the
essential information regarding her company. What is the social engineering technique
Steve employed in the above scenario?
A.
Diversion theft
B.
Baiting
C.
Honey trap
D.
Piggybacking
Piggybacking
Nedved is an IT Security Manager of a bank in his country. One day. he found out that
there is a security breach to his company's email server based on analysis of a suspicious
connection from the email server to an unknown IP Address.
What is the first thing that Nedved needs to do before contacting the incident response
team?
A.
Leave it as it Is and contact the incident response te3m right away
B.
Block the connection to the suspicious IP Address from the firewall
C.
Disconnect the email server from the network
D.
Migrate the connection to the backup email server
Disconnect the email server from the network
In the field of cryptanalysis, what is meant by a “rubber-hose” attack?
A.
Forcing the targeted keystream through a hardware-accelerated device such as an ASIC.
B.
A backdoor placed into a cryptographic algorithm by its creator.
C.
Extraction of cryptographic secrets through coercion or torture.
D.
Attempting to decrypt ciphertext by making logical assumptions about the contents of the original plaintext.
Extraction of cryptographic secrets through coercion or torture.
Page 22 out of 104 Pages |
Previous |