June, a security analyst, understands that a polymorphic virus has the ability to mutate and can change its
known viral signature and hide from signature-based antivirus programs.
Can June use an antivirus program in this case and would it be effective against a polymorphic virus?
Simon is security analyst writing signatures for a Snort node he placed internally that captures all mirrored
traffic from his border firewall.
From the following signature, what will Snort look for in the payload of the suspected packets?
alert tcp $EXTERNAL_NET any -> $HOME_NET 27374 (msG. "BACKDOOR SIG - SubSseven 22";flags: A+;
content: "|0d0a5b52504c5d3030320d0a|"; reference:arachnids,485;) alert
You are trying to package a RAT Trojan so that Anti-Virus software will not detect it.
Which of the listed technique will NOT be effective in evading Anti-Virus scanner?
What will the following command produce on a website's login page if executed successfully?
SELECT email, passwd, login_id, full_name FROM members WHERE email = 'someone@somewhere.com';
DROP TABLE members; --'
Oregon Corp is fighting a litigation suit with Scamster Inc. Oregon has assigned a private investigative agency
to go through garbage, recycled paper, and other rubbish at Scamster's office site in order to find relevant
information.
What would you call this kind of activity?
__________ is found in all versions of NTFS and is described as the ability to fork file data into existing files
without affecting their functionality, size, or display to traditional file browsing utilities like dir or Windows
Explorer
A company is legally liable for the content of email that is sent from its systems, regardless of whether the
message was sent for private or business-related purposes. This could lead to prosecution for the sender and
for the company's directors if, for example, outgoing email was found to contain material that was pornographic,
racist, or likely to incite someone to commit an act of terrorism. You can always defend yourself by "ignorance
of the law" clause.
Paul has just finished setting up his wireless network. He has enabled numerous security features such as
changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Paul
notices that when he uses his wireless connection, the speed is sometimes 54 Mbps and sometimes it is only
24Mbps or less. Paul connects to his wireless router's management utility and notices that a machine with an
unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that
the unfamiliar machine has the same MAC address as his laptop.
What is Paul seeing here?