Which of the following are open-source vulnerability scanners?
Correct Answer:
ABD
Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
ABD
In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?
Correct Answer:
C
When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?
Correct Answer:
B
You execute the following netcat command:
c:targetnc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?
Correct Answer:
D