Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:
* 1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.
* 2. Reducing noise by adjusting color and averaging pixel value.
* 3. Sharpening, Rotating, Resampling, and Softening the image.
Which of the following Steganography attacks is Victor using?
Correct Answer:
B
Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.
Correct Answer:
AB
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. Active Directory integrated zone has been configured on the network. You want to create a text file that lists the resource records of a specified zone for your record. Which of the following commands will you use to accomplish the task?
Correct Answer:
C
Which of the following tools is an open source protocol analyzer that can capture traffic in real time?
Correct Answer:
C
Which of the following is an automated vulnerability assessment tool?
Correct Answer:
B