Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?
You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to find out when a particular user was last logged in.To accomplish this, you need to analyze the log configuration files.Which of the following Unix log configuration files can you use to accomplish the task?
An executive in your company reports odd behavior on her PDA. After investigation you discover that a trusted device is actually copying data off the PDA. The executive tells you that the behavior started shortly after accepting an e-business card from an unknown person.What type of attack is this?
You work as a professional Ethical Hacker. You are assigned a project to perform blackbox testing of the security of www.we-are-secure.com. Now you want to perform banner grabbing to retrieve information about the Webserver being used by we-are-secure.Which of the following tools can you use to accomplish the task?
The tool works under Windows 9x/2000. Which of the following tools can be used to automate the MITM attack?
Which of the following commands can be used to intercept and log the Linux kernel messages?