00:00

QUESTION 71

- (Topic 4)
Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.

Correct Answer: CD

QUESTION 72

- (Topic 3)
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. John has gained the access to the network of the organization and placed a backdoor in the network. Now, he wants to clear all event logs related to previous hacking attempts. Which of the following tools can John use if we-are-secure.com is using the Windows 2000 server?
Each correct answer represents a complete solution. Choose two.

Correct Answer: AB

QUESTION 73

- (Topic 4)
Which of the following is NOT an example of passive footprinting?

Correct Answer: A

QUESTION 74

- (Topic 2)
You want to run the nmap command that includes the host specification of 202.176.56-57.*.
How many hosts will you scan?

Correct Answer: A

QUESTION 75

- (Topic 1)
All of the following are advantages of using the Metasploitpriv module for dumping hashes from a local Windows machine EXCEPT:

Correct Answer: B
Reference:
http://www.vita.virginia.gov/uploadedFiles/VITA_Main_Public/Security/Meetings/ISOAG/2012/2012_Jan_ISOAG.pdf