- (Topic 3)
One of the sales people in your company complains that sometimes he gets a lot of unsolicited messages on his PDA. After asking a few questions, you determine that the issue only occurs in crowded areas like airports. What is the most likely problem?
Correct Answer:B
- (Topic 3)
Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?
Correct Answer:A
- (Topic 2)
Which of the following tools allow you to perform HTTP tunneling?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:ABD
- (Topic 4)
Which of the following tools can be used to find a username from a SID?
Correct Answer:C
- (Topic 1)
Why is it important to have a cheat sheet reference of database system tables when performing SQL Injection?
Correct Answer:D
Reference: http://www.rackspace.com/knowledge_center/article/sql-injection-in-mysql
- (Topic 2)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using the Linux operating system. He wants to use a wireless sniffer to sniff the We-are-secure network. Which of the following tools will he use to accomplish his task?
Correct Answer:D