GCFA Exam Question 26

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare- secure.com. He is working on the Linux operating system. He wants to sniff the we-are-secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?
  • GCFA Exam Question 27

    You work as the Network Administrator for McNeil Inc. The company has a Unix-based network. You want to set the hard disk geometry parameters, cylinders, heads, and sectors. Which of the following Unix commands can you use to accomplish the task?
  • GCFA Exam Question 28

    You want to retrieve information whether your system is in promiscuous mode or not. Which of the following commands will you use?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCFA Exam Question 29

    Which of the following NIST RA process steps has the goal to identify the potential threat-sources and compile a threat statement listing the potential threat-sources that are applicable to the IT system being evaluated?
  • GCFA Exam Question 30

    You want to retrieve information whether your system is in promiscuous mode or not. Which of the following commands will you use?
    Each correct answer represents a complete solution. Choose all that apply.