Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?
Which of the following tools is used to download the Web pages of a Website on the local system?
Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?
Which of the following applications is an example of a data-sending Trojan?
Adam works as an Incident Handler for Umbrella Inc. He has been sent to the California unit to train the members of the incident response team. As a demo project he asked members of the incident response team to perform the following actions:β Remove the network cable wires.β Isolate the system on a separate VLANβ Use a firewall or access lists to prevent communication into or out of the system.β Change DNS entries to direct traffic away from compromised systemWhich of the following steps of the incident handling process includes the above actions?
Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?