Which of the following tools uses common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures of the rootkits?
Correct Answer:C
Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:ABD
Which of the following ensures that the investigation process of incident response team does not break any laws during the response to an incident?
Correct Answer:C
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
Correct Answer:B
Which of the following is executed when a predetermined event occurs?
Correct Answer:B