100%(10)10 out of 10 people found this document helpful
This preview shows page 7 - 9 out of 356 pages.
This type of scanning is hard to trace because the attacker never establishes a full 3-way handshakeconnection and most sites do not create a log of incomplete TCP connections.QUESTION 12Lori is a Certified Ethical Hacker as well as a Certified Hacking Forensics Investigator working as an ITsecurity consultant. Lori has been hired on by Kiley Innovators, a large marketing firm that recentlyunderwent a string of thefts and corporate espionage incidents. Lori is told that a rival marketing companycame out with an exact duplicate product right before Kiley Innovators was about to release it. Theexecutive team believes that an employee is leaking information to the rival company. Lori questions allemployees, reviews server logs, and firewall logs; after which she finds nothing. Lori is then givenpermission to search through the corporate email system. She searches by email being sent to and sentfrom the rival marketing company.She finds one employee that appears to be sending very large email to this other marketing company, eventhough they should have no reason to be communicating with them. Lori tracks down the actual emails sentand upon opening them, only finds picture files attached to them. These files seem perfectly harmless,usually containing some kind of joke. Lori decides to use some special software to further examine thepictures and finds that each one had hidden text that was stored in each picture.What technique was used by the Kiley Innovators employee to send information to the rival marketingcompany?CSection: (none)ExplanationExplanation/Reference:Explanation:QUESTION 13You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server information from services runningon ports 21, 110 and 123.Here is the output of your scan results:Which of the following nmap command did you run?
CExplanationExplanation/Reference:Explanation:QUESTION 14How do you defend against Privilege Escalation?A.Use encryption to protect sensitive dataB.Restrict the interactive logon privilegesC.Run services as unprivileged accountsD.Allow security settings of IE to zero or LowE.Run users and applications on the least privilegesCorrect Answer: ABCESection: (none)ExplanationExplanation/Reference:Explanation:QUESTION 15What does ICMP (type 11, code 0) denote?