Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor". Here is the output of the SIDs:
From the above list identify the user account with System Administrator privileges.
Correct Answer:
F
Due to a slowdown of normal network operations, the IT department decided to monitor internet traffic for all of the employees. From a legal standpoint, what would be troublesome to take this kind of measure?
Correct Answer:
C
Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?
Correct Answer:
B
Which Intrusion Detection System is the best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?
Correct Answer:
C
What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?
Correct Answer:
D