Question: Which statement is incorrect about the process of port redirection: The first step requires the attacker to listen on a port to send but not
- Which statement is incorrect about the process of port redirection:
- The first step requires the attacker to listen on a port to send but not receive data.
- The attacker will drop a malicious payload on the victims system to execute system level commands
- The attacker will drop a malicious payload on the victims system to execute system level commands
- Payloads can be delivered via email, crafted scripts, malicious files, and so on.
- The Netcat utility which comes built-in with Zenmap can enable an attacker completely control a victims system but not perform any desired actions such as browsing files, creating persistent backdoor or accessing the cmd.exe tool.
- True
- False
- In the Performing Port Redirection task, to set up a listener, at the command prompt, you type the following command:
ncat -port -v -l -p 8080
-
- True
- False
- Using TCPView:
step 1: You open Internet Explorer and connect to a website
step2 You observe that new entries are added to the TCPView window according to the new connection that was established when you opened up the website.
step3: You then close Internet Explorer and observe that the newly added entries are removed from the TCPView window.
The above 3 steps is what you expect when using the TCPView window.
- True
- False
- Which statement is incorrect:
A. All employees know and never click icons in e-mail messages that can potentially allow another person to access their computers from a remote location
B. Your security approach to users or potential customers should promote awareness rather than instill fear.
C. To counter the introduction of spyware and adware into a corporate network, you should invest in an antivirus product.
D. You should point out to users how important it is not to install programsespecially those not approved by the companyon their desktops because of the possibility of introducing malware.
- A spyware program sends information from the infected computer to the person who initiated the spyware program on your computer. One of the following most likely cannot be achieved by spyware activity:
A. Stealing email attachments
B. Stealing financial data, passwords, PINs
C. Stealing internet usage data
D. Lifting keyboard keystrokes
HELP PLEASE !!!
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
