Which of the following is spy software that records activity on Macintosh systems via snapshots, keystrokes, and Web site logging?
Which of the following statements are true about Dsniff?
Each correct answer represents a complete solution. Choose two.
Which of the following are the automated tools that are used to perform penetration testing?
Each correct answer represents a complete solution. Choose two.
James works as a Database Administrator for Techsoft Inc. The company has a SQL Server 2005 computer. The computer has a database named Sales. Users complain that the performance of the database has deteriorated. James opens the System Monitor tool and finds that there is an increase in network traffic. What kind of attack might be the cause of the performance deterioration?
In which of the following steps of the incident handling processes does the Incident Handler make sure that all business processes and functions are back to normal and then also wants to monitor the system or processes to ensure that the system is not compromised again?
Which of the following is a technique for creating Internet maps?
Each correct answer represents a complete solution. Choose two.
Which of the following statements are true about session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
Which of the following netcat parameters makes netcat a listener that automatically restarts itself when a connection is dropped?
You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?