Explanation:
Steganography is the art of concealing a secret message within (or even on top of) a non-secret object. That something can be anything you want it to be. Many forms of steganography nowadays involve hiding a secret piece of text within a photograph.
Explanation:
Buffer overflow attacks can be mitigated by performing bounds checks.
Explanation:
End user training is the most effective strategy to prevent social engineering assaults. Employees must be taught how to react in specific scenarios. They won't be taken off guard this way. Users should also be taught how to spot suspicious conduct.
Explanation:
Traceroute is a network diagnostic tool that tracks a packet's travel from source to destination on an IP network in real time, revealing the IP addresses of all the routers it pings along the way.
Explanation:
split DNS is the ability of a Domain Name System (DNS) implementation to deliver various sets of DNS information, which is normally determined by the DNS request's originating address. This facility may be able to provide a security and privacy method.
Explanation:
Block the ports 139 and 445, which are utilized by NetBIOS null sessions, by blocking these ports.
Explanation:
A "honeypot" attack is a type of AP impersonation attack in which an attacker from outside the building puts up an AP with the same BSSID and ESSID as a legitimate AP and tries to entice enterprise customers to connect to it.
The correct answer:
To avoid alerting the IDS
Explanation:
Scan for TCP SYN (Stealth) (-sS) For good reason, SYN scan is the default and most popular scan option. It can be done quickly, with thousands of ports being scanned per second on a fast network with no obtrusive firewalls. It is the default TCP scan when raw-packet privileges are available, and it requires raw-packet privileges.