TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?
A. Solaris
B. Red Hat
C. Knoppix
D. Windows
A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?
A. OpenSSH
B. IPTables
C. IPChains
D. Stunnel
You are responsible for maintaining and troubleshooting PC's at your company. The receptionist reports her screen has gone blue. When you get there you notice the 'blue screen of death' with an error message NTFS_FILE_SYSTEM. What is the most likely cause of this error?
A. The hard disk is corrupt
B. A virus
C. Windows was installed improperly.
D. Get the latest patch for Windows.
Your network has a Windows 2000 Server computer with FAT file system, shared by several users.
This system stores sensitive data. You decide to encrypt this data to protect it from unauthorized access. You want to accomplish the following goals:
Data should be secure and encrypted.
Administrative efforts should be minimum.
You should have the ability to recover encrypted files in case the file owner leaves the company.
Other permissions on encrypted files should be unaffected.
File-level security is required on the disk where data is stored.
Encrypting or decrypting of files should not be the responsibility of the file owner.
You take the following steps to accomplish these goals :
Convert the FAT file system to Windows 2000 NTFS file system.
Use Encrypting File System (EFS) to encrypt data.
Which of the following goals will you be able to accomplish?
Each correct answer represents a complete solution. Choose all that apply.
A. File-level security is available on the disk where data is stored.
B. You have the ability to recover encrypted files in case the file owner leaves the company.
C. Encrypting or decrypting of files is no longer the responsibility of the file owner.
D. Data are secured and encrypted.
E. Administrative efforts are minimum.
F. Other permissions on encrypted files are unaffected.
Which of the following is used to authenticate asymmetric keys?
A. Password
B. Digital signature
C. MAC Address
D. Demilitarized zone (DMZ)
Adam works as a Security Analyst for Umbrella Inc. He suspects that a virus exists in the network of the company. He scanned the client system with latest signature-based anti-virus, but no productive results have been obtained. Adam suspects that a polymorphic virus exists in the network. Which of the following statements are true about the polymorphic virus?
Each correct answer represents a complete solution. Choose all that apply.
A. When the user runs the infected file in the disk, it loads virus into the RAM.
B. The mutation engine of polymorphic virus generates a new encrypted code, this changes the signature of the virus.
C. It has the ability to mutate and can change its known viral signature and hide from signature based antivirus programs.
D. The new virus resides in the main memory of the computer and does not infect other files of the operating system.
On your dual booting computer, you want to set Windows 98 as the default operating system at startup. In which file will you define this?
A. NTBOOTDD.SYS
B. BOOT.INI
C. NTDETECT.COM
D. BOOTSECT.DOS
Which of the following types of cyber stalking damage the reputation of their victim and turn other people against them by setting up their own Websites, blogs or user pages for this purpose?
A. False victimization
B. Encouraging others to harass the victim
C. False accusations
D. Attempts to gather information about the victim
Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?
A. Evidor
B. HxD
C. WinHex
D. Vedit
You want to change the attribute of a file named ACE.TXT to Hidden. Which command line will enable you to set the attribute?
A. ATTRIB ACE.TXT -H
B. ATTRIB ACE.TXT /HR
C. ATTRIB ACE.TXT +H
D. ATTRIB ACE.TXT /H