Which of the following tools is a free laptop tracker that helps in tracking a user’s laptop in case it
gets stolen?
A.
SAINT
B.
Adeona
C.
Snort
D.
Nessus
Explanation:
Adeona is a free laptop tracker that helps in tracking a user’s laptop in case it gets stolen. All it
takes is to install the Adeona software client on the user’s laptop, pick a password, and make it run
in the background. If at one point, the user’s laptop gets stolen and is connected to the Internet,
the Adeona software sends the criminal’s IP address. Using the Adeona Recovery, the IP address
can then be retrieved. Knowing the IP address helps in tracking the geographical location of the
stolen device.
Answer option D is incorrect. Nessus is proprietary comprehensive vulnerability scanning
software. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect
potential vulnerabilities on tested systems. It is capable of checking various types of vulnerabilities,
some of which are as follows:Vulnerabilities that allow a remote cracker to control or access
sensitive data on a system Misconfiguration (e.g. open mail relay, missing patches, etc)Default
passwords, a few common passwords, and blank/absent passwords on some system accounts.
Nessus can also call Hydra (an external tool) to launch a dictionary attack.Denials of service
against the TCP/IP stack by using mangled packets
Answer option A is incorrect. SAINT stands for System Administrator’s Integrated Network Tool. It
is computer software used for scanning computer networks for security vulnerabilities, and
exploiting found vulnerabilities. The SAINT scanner screens every live system on a network forTCP and UDP services. For each service it finds running, it launches a set of probes designed to
detect anything that could allow an attacker to gain unauthorized access, create a denial-ofservice, or gain sensitive information about the network.
Answer option C is incorrect. Snort is an open source network intrusion detection system. The
Snort application analyzes network traffic in realtime mode. It performs packet sniffing, packet
logging, protocol analysis, and a content search to detect a variety of potential attacks.