This type of scanning is hard to trace because the attacker never establishes a full 3-way handshakeconnection and most sites do not create a log of incomplete TCP connections.
QUESTION 12Lori is a Certified Ethical Hacker as well as a Certified Hacking Forensics Investigator working as an ITsecurity consultant. Lori has been hired on by Kiley Innovators, a large marketing firm that recentlyunderwent a string of thefts and corporate espionage incidents. Lori is told that a rival marketing companycame out with an exact duplicate product right before Kiley Innovators was about to release it. Theexecutive team believes that an employee is leaking information to the rival company. Lori questions allemployees, reviews server logs, and firewall logs; after which she finds nothing. Lori is then givenpermission to search through the corporate email system. She searches by email being sent to and sentfrom the rival marketing company.She finds one employee that appears to be sending very large email to this other marketing company, eventhough they should have no reason to be communicating with them. Lori tracks down the actual emails sentand upon opening them, only finds picture files attached to them. These files seem perfectly harmless,usually containing some kind of joke. Lori decides to use some special software to further examine thepictures and finds that each one had hidden text that was stored in each picture.What technique was used by the Kiley Innovators employee to send information to the rival marketingcompany?
C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 13You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server information from services runningon ports 21, 110 and 123.Here is the output of your scan results:Which of the following nmap command did you run?

C
Explanation
Explanation/Reference:
Explanation:
QUESTION 14
How do you defend against Privilege Escalation?
A.
Use encryption to protect sensitive data
B.
Restrict the interactive logon privileges
C.
Run services as unprivileged accounts
D.
Allow security settings of IE to zero or Low
E.
Run users and applications on the least privileges
Correct Answer:
ABCE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 15
What does ICMP (type 11, code 0) denote?

