Which of the following statements explains the dumpster diving hacking technique?
A. This is an information gathering technique in which the attacker runs a software program to
automatically call thousands of telephone numbers to find out a victim who has attached a modem
to the Internet.
B. This is an information gathering technique in which an attacker rummages through all the
discarded waste-papers in the victim's trash.
C. This is an information gathering technique in which the attacker calls the help center of the
organization and asks someone to reset a password.
D. This is an information gathering technique in which the attacker injects a Trojan in the victim's
computer.
B
Which of the following techniques is used to log network traffic?
C
Which of the following tools is used to verify Group Policy Object (GPO) settings?
B
Which of the following statements is true about a honeyfarm?
C
Which of the following commands is used to test a network connection?
D
What is the size of Master Boot Record (MBR)?
A. 512 bytes
B. 256 bytes
C. 1 KB
D. 2 KB
A
Which of the following is a transport layer circuit-level proxy server?
C
Which of the following steps in the Computer Forensic Investigation process limits the extent and
significance of an incident to ensure that it does not spread to other systems?
A
Which of the following forensic tool suite is developed for Linux operating system?
B
Which of the following law does not protect intellectual property?
A. Murphy's law
B. Trademark
C. Patent law
D. Copyright
A
Which of the following tools is used to clear the event log?
A
Which of the following password cracking attacks is implemented by calculating all the possible
hashes for a set of characters?
A
Which of the following attacks is used to hack simple alphabetical passwords?
A
Which of the following is the phase of Incident handling process in which the distinction between an
event and an incident is made?
A. Identification phase
B. Preparation phase
C. Eradication phase
D. Differential phase
A
Which of the following programs is used to monitor the keystrokes that a user types on a specific
computer's keyboard?
A