Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?
Adam works as a Security Analyst for Umbrella Inc. Company has a Windows-based network. All computers run on Windows XP. Manager of the Sales department complains Adam about the unusual behavior of his computer. He told Adam that some pornographic contents are suddenly appeared on his computer overnight. Adam suspects that some malicious software or Trojans have been installed on the computer. He runs some diagnostics programs and Port scanners and found that the Port 12345, 12346, and 20034 are open. Adam also noticed some tampering with the Windows registry, which causes one application to run every time when Windows start.
Which of the following is the most likely reason behind this issue?
Which of the following types of attacks is only intended to make a computer resource unavailable to its users?
Which of the following tools can be used for steganography?
Each correct answer represents a complete solution. Choose all that apply.