00:00

QUESTION 66

Which of the following are open-source vulnerability scanners?

Correct Answer: ABD

QUESTION 67

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ABD

QUESTION 68

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

Correct Answer: C

QUESTION 69

When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?

Correct Answer: B

QUESTION 70

You execute the following netcat command:
c:targetnc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?

Correct Answer: D