- (Topic 3)
Which of the following are considered Bluetooth security violations?
Each correct answer represents a complete solution. Choose two.
Correct Answer:CD
- (Topic 4)
Which of the following is NOT a Back orifice plug-in?
Correct Answer:D
- (Topic 1)
Approximately how many packets are usually required to conduct a successful FMS attack onWEP?
Correct Answer:B
- (Topic 2)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:
l Gathering information
l Determining the network range
l Identifying active systems
Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?
Correct Answer:B
- (Topic 4)
Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police. A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?
Correct Answer:D
- (Topic 1)
You are done pen testing a Windows system and need to clean up some of the changes you have made. You created an account ‘pentester’ on the system, what command would you use to delete that account?
Correct Answer:D