- (Topic 4)
Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.
Correct Answer:
CD
- (Topic 3)
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. John has gained the access to the network of the organization and placed a backdoor in the network. Now, he wants to clear all event logs related to previous hacking attempts. Which of the following tools can John use if we-are-secure.com is using the Windows 2000 server?
Each correct answer represents a complete solution. Choose two.
Correct Answer:
AB
- (Topic 4)
Which of the following is NOT an example of passive footprinting?
Correct Answer:
A
- (Topic 2)
You want to run the nmap command that includes the host specification of 202.176.56-57.*.
How many hosts will you scan?
Correct Answer:
A
- (Topic 1)
All of the following are advantages of using the Metasploitpriv module for dumping hashes from a local Windows machine EXCEPT:
Correct Answer:
B
Reference:
http://www.vita.virginia.gov/uploadedFiles/VITA_Main_Public/Security/Meetings/ISOAG/2012/2012_Jan_ISOAG.pdf