Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
A. Tunneling proxy server
B. Reverse proxy server
C. Anonymous proxy server
D. Intercepting proxy server
Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.
A. Checkpoint files
B. EDB and STM database files
C. Temporary files
D. cookie files
Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?
A. MAK ID
B. IP address
C. IP identification number
D. SSID
Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?
A. Vedit
B. WinHex
C. HxD
D. Evidor
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You want to know the current TCP/IP network configuration settings, DHCP server IP address, and DHCP lease expiration date of your
network.
Which of the following utilities will you use?
A. PING
B. TELNET
C. TRACERT
D. IPCONFIG
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system. Which of the following files will Adam investigate to accomplish the task?
A. /boot/grub/menu.lst
B. /grub/grub.com
C. /boot/boot.conf
D. /boot/grub/grub.conf
John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers. Which system is John using to track the malicious hackers?
A. Honeypot
B. Honeytokens
C. Intrusion Detection System (IDS)
D. Bastion host
Which of the following techniques allows the existence of both the Ipv6 and Ipv4 protocols in a device or network?
A. Duplexing
B. Dual stack
C. Clustering
D. Mirroring
Which of the following is an exact duplicate of computer's hard drive?
A. system image
B. bit-stream image
C. data image
D. drive image
Which of the following is not a Denial of Service (DoS) attack?
A. Smurf attack
B. Code injection attack
C. Ping of Death attack
D. Teardrop attack