Which of the following malicious programs changes its signature continuously to be invisible to IDS?
Correct Answer:D
Which of the following OSI layers is responsible for protocol conversion, data encryption/decryption, and data compression?
Correct Answer:C
Which of the following monitors program activities and modifies malicious activities on a system?
Correct Answer:C
Which of the following statements is NOT true about the file slack spaces in Windows operating system?
Correct Answer:B
Which of the following is a checksum algorithm?
Correct Answer:B
In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:ABC