How can a rootkit bypass Windows 7 operating system’s kernel mode, code signing policy?
A hacker is attempting to use nslookup to query Domain Name Service (DNS). The hacker uses the nslookup interactive mode for the search. Which command should the hacker type into the command shell to request the appropriate records?
A security engineer is attempting to map a company’s internal network. The engineer enters in the following NMAP command:
NMAP –n –sS –P0 –p 80 ***.***.**.**
What type of scan is this?
To send a PGP encrypted message, which piece of information from the recipient must the sender have before encrypting the message?
Which of the following open source tools would be the best choice to scan a network for potential targets?
Which command line switch would be used in NMAP to perform operating system detection?
An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this?
What is a successful method for protecting a router from potential smurf attacks?
Which of the following is a hashing algorithm?
An attacker has been successfully modifying the purchase price of items purchased on the company's web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the Intrusion Detection System (IDS) logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the purchase price?