- (Topic 1)
What concept do Rainbow Tables use to speed up password cracking?
Correct Answer:D
Reference:
http://en.wikipedia.org/wiki/Space–time_tradeoff
- (Topic 1)
You are pen testing a network and have shell access to a machine via Netcat. You try to use ssh to access another machine from the first machine. What is the expected result?
Correct Answer:C
- (Topic 2)
Which of the following is the most common method for an attacker to spoof email?
Correct Answer:D
CORRECT TEXT - (Topic 4)
Fill in the blank with the appropriate act name.
The ____act gives consumers the right to ask emailers to stop spamming them.
Correct Answer:CAN-SPAM
- (Topic 1)
You have been contracted to penetration test an e-mail server for a client that wants to know for sure if the sendmail service is vulnerable to any known attacks. You have permission to run any type of test, how will you proceed to give the client the most valid answer?
Correct Answer:C
- (Topic 3)
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. John has gained the access to the network of the organization and placed a backdoor in the network. Now, he wants to clear all event logs related to previous hacking attempts. Which of the following tools can John use if we-are-secure.com is using the Windows 2000 server?
Each correct answer represents a complete solution. Choose two.
Correct Answer:AB