Fill in the blank with the command to complete the statement below. Do not enter the full path of the command. The command is used to remove the print jobs that have been queued for printing by using a secure connection.
Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)?
Each correct answer represents a complete solution. Choose all that apply.
A. Denial-of-Service (DoS) attack
B. E-mail spoofing
C. Port scan attack
D. Shoulder surfing
Which of the following statements best describes a certification authority?
A. A certification authority is a type of encryption that uses a public key and a private key pair fordata encryption.
B. A certification authority is an entity that issues digital certificates for use by other parties.
C. A certification authority is a technique to authenticate digital documents by using computercryptography.
D. A certification authority is a type of encryption that uses a single key to encrypt and decryp t data.
Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?
A. Steganography
B. Public-key cryptography
C. Encryption
D. RSA algorithm
Which of the following commands is most useful for viewing large files in Linux?
A. less
B. cp
C. touch
D. cat
Which of the following is a technique of attacks in which the attacker secretly listens to the private conversation between victims?
A. Dialler attack
B. Denial of service
C. Eavesdropping
D. Intrusion
You work as a Network Administrator for Infonet Inc. The company's office has a wireless network. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?
A. Internet service provider's DNS server address
B. I/O address
C. Service Set Identifier
D. Demilitarized zone
Which of the following tools automates the password guessing in NetBIOS sessions and can also be used to perform a manual dictionary attack?
A. KerbCrack
B. Legion
C. THC Hydra
D. Pwdump
Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session.
The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason. Which of the following mistakes made by Jason helped the Forensic Investigators catch him?
A. Jason did not perform a vulnerability assessment.
B. Jason did not perform port scanning.
C. Jason did not perform foot printing.
D. Jason did not perform OS fingerprinting.
E. Jason did not perform covering tracks.
Which of the following layers of the OSI model provides non-repudiation services?
A. The application layer
B. The physical layer
C. The data-link layer
D. The presentation layer