Fill in the blank with the appropriate name of the attack. takes best advantage of an existing authenticated connection
Which of the following Linux rootkits allows attackers to hide files, processes, and network connections?
Each correct answer represents a complete solution. Choose all that apply.
A. Phalanx2
B. Adore
C. Knark
D. Beastkit
Cola Co. manufactures, markets, sells, and distributes non-alcoholic potables such as Lemcaa and Thunder Up under its brand name Cola and uses green and red logo. Mola Co., a new company, starts manufacturing, marketing, selling, and distributing non-alcoholic potables like Lumca and Cloud Up under its brand name Mola and uses green and red logo. Which of the following violations has been committed by Mola Co.?
A. Copyright infringement
B. Trademark infringement
C. Patent law
D. Plagiarism
What does CSIRT stand for?
A. Computer Security Information Response Team
B. Chief Security Incident Response Team
C. Computer Security Incident Response Team
D. Chief Security Information Response Team
Which of the following tunneling protocols is used to make data transfers secure on the network layer?
A. L2TP
B. L2F
C. IPSec
D. PPTP
Which of the following statements is true about a honeyfarm?
A. It is a computer system used to attract hackers to identify them.
B. It is a computer system that has no security.
C. It is a centralized collection of honeypots.
D. It is a firewall.
Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He is working on a case of a cyber crime. Peter knows that the good investigative report should not only communicate the relevant facts, but also present expert opinion. This report should not include the cases in which the expert acted as a lay witness. Which of the following type of witnesses is a lay witness?
A. One who observes an event.
B. One with special knowledge of the subject about which he or she is testifying.
C. One who can give a firsthand account of something seen, heard, or experienced.
D. One who is not qualified as an expert witness.
In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?
A. Role Based Access Control (RBAC)
B. Mandatory Access Control (MAC)
C. Access Control List (ACL)
D. Discretionary Access Control (DAC)
Which of the following statements are TRUE about Demilitarized zone (DMZ)?
Each correct answer represents a complete solution. Choose all that apply.
A. The purpose of a DMZ is to add an additional layer of security to the Local Area Network of an organization.
B. In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the Internet.
C. Hosts in the DMZ have full connectivity to specific hosts in the internal network.
D. Demilitarized zone is a physical or logical sub-network that contains and exposes external services of an organization to a larger un-trusted network.
You work as a Desktop Technician for Umbrella Inc. The company has a Windows-based network.
You receive an e-mail from the network administrator's e-mail ID asking you to provide your password so that he can make changes to your profile. You suspect that someone is trying to hack your password after you have confirmed that the
network administrator did not send any such type of e-mail. Which of the following types of attacks have been executed?
Each correct answer represents a part of the solution. Choose all that apply.
A. Buffer-overflow attack
B. Social engineering
C. Zero-day attack
D. E-mail spoofing