1.
Which of the following statements are correct about spoofing and session hijacking? Each correct answer represents a complete solution. Choose all that apply.
2.
Which of the following attacks allows an attacker to retrieve crucial information from a Web server's database?
3.
Which of the following Trojans is used by attackers to modify the Web browser settings?
4.
Which of the following statements is true about a Trojan engine?
5.
Which of the following is an Internet mapping technique that relies on various BGP collectors that collect information such as routing updates and tables and provide this information publicly?
6.
The IT administrator wants to implement a stronger security policy. What are the four most important security priorities for Examkiller Software Systems Pvt. Ltd.?
7.
Which of the following IP packet elements is responsible for authentication while using IPSec?
8.
Which of the following tools is used for port scanning?
9.
When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?
10.
Which of the following attacking methods allows the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer by changing the Media Access Control address?