tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    55. You have compromised a server and successfully gained a root access. You want M pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System. What is the best approach?

    A. Install Cryptcat and encrypt outgoing packets from this server.

    B. Use HTTP so that all traffic can be routed via a browser, thus evading the internal Intrusion Detection Systems.

    C. Use Alternate Data Streams to hide the outgoing packets from this server.

    D. Install and use Telnet to encrypt all outgoing traffic from this server.



    56. It is a short-range wireless communication technology intended to replace the cables connecting portable of fixed devices while maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short-range wireless connection. Which of the following terms best matches the definition?

    A. WLAN

    B. InfraRed

    C. Bluetooth

    D. Radio-Frequency Identification



    < Prev.Page             CEHv9 Home             Next page>