This type of scanning is hard to trace because the attacker never establishes a

This type of scanning is hard to trace because the

This preview shows page 7 - 9 out of 356 pages.

This type of scanning is hard to trace because the attacker never establishes a full 3-way handshakeconnection and most sites do not create a log of incomplete TCP connections. QUESTION 12Lori is a Certified Ethical Hacker as well as a Certified Hacking Forensics Investigator working as an ITsecurity consultant. Lori has been hired on by Kiley Innovators, a large marketing firm that recentlyunderwent a string of thefts and corporate espionage incidents. Lori is told that a rival marketing companycame out with an exact duplicate product right before Kiley Innovators was about to release it. Theexecutive team believes that an employee is leaking information to the rival company. Lori questions allemployees, reviews server logs, and firewall logs; after which she finds nothing. Lori is then givenpermission to search through the corporate email system. She searches by email being sent to and sentfrom the rival marketing company.She finds one employee that appears to be sending very large email to this other marketing company, eventhough they should have no reason to be communicating with them. Lori tracks down the actual emails sentand upon opening them, only finds picture files attached to them. These files seem perfectly harmless,usually containing some kind of joke. Lori decides to use some special software to further examine thepictures and finds that each one had hidden text that was stored in each picture.What technique was used by the Kiley Innovators employee to send information to the rival marketingcompany? C Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 13You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server information from services runningon ports 21, 110 and 123.Here is the output of your scan results:Which of the following nmap command did you run?
Image of page 7
C Explanation Explanation/Reference: Explanation: QUESTION 14 How do you defend against Privilege Escalation? A. Use encryption to protect sensitive data B. Restrict the interactive logon privileges C. Run services as unprivileged accounts D. Allow security settings of IE to zero or Low E. Run users and applications on the least privileges Correct Answer: ABCE Section: (none) Explanation Explanation/Reference: Explanation: QUESTION 15 What does ICMP (type 11, code 0) denote?
Image of page 8
Image of page 9

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture