Taylor, a security professional, uses a tool to monitor her company's website, analyze the
website's traffic, and track the geographical location of the users visiting the company's
website. Which of the following tools did Taylor employ in the above scenario?
A.
WebSite Watcher
B.
web-Stat
C.
Webroot
D.
WAFW00F
web-Stat
Explanation: Increase your web site’s performance and grow! Add Web-Stat to your site
(it’s free!) and watch individuals act together with your pages in real time.
Learn how individuals realize your web site. Get details concerning every visitor’s path
through your web site and track pages that flip browsers into consumers.
One-click install. observe locations, in operation systems, browsers and screen sizes and
obtain alerts for new guests and conversions
In Trojan terminology, what is a covert channel?
A.
A channel that transfers information within a computer system or network in a way that violates the security policy
B.
A legitimate communication path within a computer system or network for transfer of data
C.
It is a kernel operation that hides boot processes and services to mask detection
D.
It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections
A channel that transfers information within a computer system or network in a way that violates the security policy
Every company needs a formal written document which spells out to employees precisely
what they are allowed to use the company's systems for, what is prohibited, and what will
happen to them if they break the rules. Two printed copies of the policy should be given to
every employee as soon as possible after they join the organization. The employee should
be asked to sign one copy, which should be safely filed by the company. No one should be
allowed to use the company's computer systems until they have signed the policy in
acceptance of its terms.
What is this document called?
A.
Information Audit Policy (IAP)
B.
Information Security Policy (ISP)
C.
Penetration Testing Policy (PTP)
D.
Company Compliance Policy (CCP)
Information Security Policy (ISP)
Kevin, a professional hacker, wants to penetrate CyberTech Inc.’s network. He employed a
technique, using which he encoded packets with Unicode characters. The company’s IDS
cannot recognize the packet, but the target web server can decode them.
What is the technique used by Kevin to evade the IDS system?
A.
Desynchronization
B.
Obfuscating
C.
Session splicing
D.
Urgency flag
Obfuscating
Explanation: Adversaries could decide to build an possible or file difficult to find or analyze
by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.
this is often common behavior which will be used across totally different platforms and
therefore the network to evade defenses
Payloads may be compressed, archived, or encrypted so as to avoid detection. These
payloads may be used throughout Initial Access or later to mitigate detection. typically a
user’s action could also be needed to open and Deobfuscate/Decode Files or info for User
Execution. The user can also be needed to input a parole to open a parole protected
compressed/encrypted file that was provided by the mortal. Adversaries can also used
compressed or archived scripts, like JavaScript.
Portions of files can even be encoded to cover the plain-text strings that will otherwise
facilitate defenders with discovery. Payloads can also be split into separate, ostensibly
benign files that solely reveal malicious practicality once reassembled.
Adversaries can also modify commands dead from payloads or directly via a Command
and Scripting Interpreter. surroundings variables, aliases, characters, and different
platform/language specific linguistics may be wont to evade signature based mostly
detections and application management mechanisms.
Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?
A.
Overloading Port Address Translation
B.
Dynamic Port Address Translation
C.
Dynamic Network Address Translation
D.
Static Network Address Translation
Static Network Address Translation
Page 30 out of 104 Pages |
Previous |