00:00

QUESTION 101

An attacker wants to launch an attack on a wired Ethernet. He wants to accomplish the following tasks:
Sniff data frames on a local area network.
Modify the network traffic.
Stop the network traffic frequently.
Which of the following techniques will the attacker use to accomplish the task?

Correct Answer: C

QUESTION 102

Which of the following statements best describes the string matching method of signature analysis?

Correct Answer: D

QUESTION 103

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

Correct Answer: D

QUESTION 104

Peter, a malicious hacker, wants to perform an attack. He first compromises computers distributed across the internet and then installs specialized software on these computers. He then instructs the compromised hosts to execute the attack. Every host can then be used to launch its own attack on the target computers. Which of the following attacks is Peter performing?

Correct Answer: B

QUESTION 105

Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc.
Which of the following types of Cross-Site Scripting attack Ryan intends to do?

Correct Answer: D