- (Exam Topic 2)
These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?
Correct Answer:
B
Script Kiddies: These hackers have limited or no training and know how to use only basictechniques or tools. Even then they may not understand any or all of what they are doing.
- (Exam Topic 3)
Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?
Correct Answer:
C
- (Exam Topic 3)
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities. Which type of virus detection method did Chandler use in this context?
Correct Answer:
B
- (Exam Topic 2)
Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL www.bank.com. the website is displayed, but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the site is not secure and the web address appears different. What type of attack he is experiencing?.
Correct Answer:
D
- (Exam Topic 3)
An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password. What kind of attack is this?
Correct Answer:
B