A man enters a PIN number at an ATM machine, being unaware that the person next to him was watching. Which of the following social engineering techniques refers to this type of information theft?
Answer : A
Which of the following approaches to vulnerability assessment relies on the administrator providing baseline of system configuration and then scanning continuously without incorporating any information found at the time of scanning?
Answer : C
Reference:http://www.netsense.info/downloads/security_wp_mva.pdf(page 12, tree-based assessment technology, second para)
Internet Control Message Protocol (ICMP) messages occur in many situations, such as whenever a datagram cannot reach the destination or the gatewaydoes not have the buffering capacity to forward a datagram. Each ICMP message contains three fields: type, code, and checksum. Different types of Internet Control Message Protocols (ICMPs) are identified by a type and code field.
Answer : D
Which of the following attacks is an offline attack?
Answer : A
Reference:http://nrupentheking.blogspot.com/2011/02/types-of-password-attack-2.html
Attackers create secret accounts and gain illegal access to resources using backdoor while bypassing the authentication procedures. Creating a backdoor is a where an attacker obtains remote access to a computer on a network.
Answer : D