Which of the following types of Penetration testing provides the testers with complete knowledge of the infrastructure to be tested?
Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?
Which of the following Web authentication techniques uses a single sign-on scheme?
Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?
Which of the following is NOT an example of passive footprinting?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
Which of the following tools is John using to crack the wireless encryption keys?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:
Gathering information
Determining the network range
Identifying active systems
Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?
Adam, a malicious hacker, hides a hacking tool from a system administrator of his company by using Alternate Data Streams (ADS) feature. Which of the following statements is true in context with the above scenario?
In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?
Which of the following tools is not a BlueSnarf attacking tool?