Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking
on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based
network. Jason successfully enters the target system remotely by using the advantage of
vulnerability. He places a Trojan to maintain future access and then disconnects the remote
session.
The employees of the company complain to Mark, who works as a Professional Ethical Hacker for
DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that
some irrelevant log files and signs of Trojans are present on the computers. He suspects that a
malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and
catches Jason. Which of the following mistakes made by Jason helped the Forensic Investigators
catch him?
A.
Jason did not perform a vulnerability assessment.
B.
Jason did not perform port scanning.
C.
Jason did not perform foot printing.
D.
Jason did not perform OS fingerprinting.
E.
Jason did not perform covering tracks.
Explanation: