Which of the following modules of OS X kernel (XNU) provides the primary system program interface?
Which of the following modules of OS X kernel (XNU) provides the primary system program interface?
The BSD subsystem in the OS X kernel (XNU) provides the primary system program interface. BSD is a key component responsible for user-level functionalities and system interfaces, making it the correct answer.
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He receives the following e- mail:
The e-mail that John has received is an example of __________.
The email John received is an example of a chain letter. Chain letters are messages sent over email that urge the recipient to forward the email to a certain number of people. They often promise rewards for doing so or threats for not complying. In this case, the email promises prizes for forwarding it to many people, fitting the description of a chain letter perfectly.
Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?
The Electronic Communications Privacy Act of 1986 (ECPA) allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers. This act was designed to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer, thus making it applicable to ISPs.
TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?
Windows can be easily identified with the help of TCP FIN scanning because unlike most Unix-based systems, Windows does not conform to the standard protocol behavior for handling FIN packets on open ports. When a FIN packet is sent to an open port in Windows, it responds with a RST packet instead of dropping the packet, making it easily identifiable via FIN scanning.
Which of the following encryption methods uses AES technology?
CCMP, or Counter Mode with Cipher Block Chaining Message Authentication Code Protocol, is a security protocol used in Wi-Fi networks. It uses AES technology to encrypt data and provide authentication.