Ethical Hacking and Countermeasures
EC-Council Disaster Recovery Professional v3 (EDRP)
Linux Security
Certified Network Defender (CND)
Certified EC-Council Instructor (CEI)
EC-Council Certified Security Specialist (ECSSv10)Exam
Ethical Hacking and Countermeasures V8
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified CISO (CCISO)
What is the CIDR from the following screenshot?
/24A./24A./24
/32 B./32 B./32
/16 C./16 C./16
/8D./8D./8
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
Linux/Unix computers are easier to compromise
Linux/Unix computers are constantly talking
Windows computers are constantly talking
Windows computers will not respond to idle scans
One way to identify the presence of hidden partitions on a suspect's hard drive is to:
Add up the total size of all known partitions and compare it to the total size of the hard drive
Examine the FAT and identify hidden partitions by noting an H in the partition Type field
Examine the LILO and note an H in the partition Type field
It is not possible to have hidden partitions on a hard drive