00:00

QUESTION 11

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:
* 1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.
* 2. Reducing noise by adjusting color and averaging pixel value.
* 3. Sharpening, Rotating, Resampling, and Softening the image.
Which of the following Steganography attacks is Victor using?

Correct Answer: B

QUESTION 12

Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.

Correct Answer: AB

QUESTION 13

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. Active Directory integrated zone has been configured on the network. You want to create a text file that lists the resource records of a specified zone for your record. Which of the following commands will you use to accomplish the task?

Correct Answer: C

QUESTION 14

Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

Correct Answer: C

QUESTION 15

Which of the following is an automated vulnerability assessment tool?

Correct Answer: B