- (Topic 23)
What is the IV key size used in WPA2?
Correct Answer:
D
- (Topic 9)
What does the following command achieve?
Telnet
Correct Answer:
C
This command is used for banner grabbing. Banner grabbing helps identify the service and version of web server running.
- (Topic 23)
Bob was frustrated with his competitor, Brownies Inc., and decided to launch an attack that would result in serious financial losses. He planned the attack carefully and carried out the attack at the appropriate moment. Meanwhile, Trent, an administrator at Brownies Inc., realized that their main financial transaction server had been attacked. As a result of the attack, the server crashed and Trent needed to reboot the system, as no one was able to access the resources of the company. This process involves human interaction to fix it. What kind of Denial of Service attack was best illustrated in the scenario above?
Correct Answer:
B
This is not a DDOS, there is only one person involved as attacker
- (Topic 2)
System Administrators sometimes post questions to newsgroups when they run into technical challenges. As an ethical hacker, you could use the information in newsgroup posting to glean insight into the makeup of a target network. How would you search for these posting using Google search?
Correct Answer:
B
Using http://groups.google.com is the easiest way to access various newsgroups today. Before http://groups.google.com you had to use special NNTP clients or subscribe to some nntp to web services.
- (Topic 4)
Which definition among those given below best describes a covert channel?
Correct Answer:
B
A covert channel is described as: "any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security policy." Essentially, it is a method of communication that is not part of an actual computer system design, but can be used to transfer information to users or system processes that normally would not be allowed access to the information.