Question 85

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover.
Which of the following Steganography methods is Victor using to accomplish the task?

Correct Answer:A

Question 86

Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?

Correct Answer:A

Question 87

You work as a System Administrator in SunSoft Inc. You are running a virtual machine on Windows Server 2003. The virtual machine is protected by DPM. Now, you want to move the virtual machine to another host. Which of the following steps can you use to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.

Correct Answer:ACD

Question 88

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He is working on the Linux operating system. He wants to sniff the we- are-secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

Correct Answer:A

Question 89

Which of the following statements about buffer overflow are true?
Each correct answer represents a complete solution. Choose two.

Correct Answer:BD

Question 90

Which of the following statements are true about Dsniff?
Each correct answer represents a complete solution. Choose two.

Correct Answer:AD

START GCIH EXAM