00:00

QUESTION 56

CORRECT TEXT - (Topic 2)
Fill in the blank with the appropriate tool name.
__________is a wireless network cracking tool that exploits the vulnerabilities in the RC4 Algorithm, which comprises the WEP security parameters.

Correct Answer: WEPcrack

QUESTION 57

- (Topic 2)
Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?

Correct Answer: B

QUESTION 58

- (Topic 2)
What difference would you expect to result from running the following commands;
(I). S dig .ns domain.com target.com -t AXFR
and
(2). S dig .ns.domain.com target.com -t IXFR=1002200301

Correct Answer: B

QUESTION 59

- (Topic 2)
Which of the following Nmap commands is used to perform a UDP port scan?

Correct Answer: D

QUESTION 60

- (Topic 2)
You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of the Bluehill Inc. For this, you start monitoring the network traffic of the Bluehill Inc.
In this process, you get that there are too many FTP packets traveling in the Bluehill Inc. network.
Now, you want to sniff the traffic and extract usernames and passwords of the FTP server. Which of the following tools will you use to accomplish the task?

Correct Answer: A