You just set up a security system in your network. In what kind of system would you find
the following string of characters used as a rule within its configuration? alert tcp any any ->
192.168.100.0/24 21 (msg: ““FTP on the network!””;)
A.
A firewall IPTable
B.
FTP Server rule
C.
A Router IPTable
D.
An Intrusion Detection System
An Intrusion Detection System
When discussing passwords, what is considered a brute force attack?
A.
You attempt every single possibility until you exhaust all possible combinations or discover the password
B.
You threaten to use the rubber hose on someone unless they reveal their password
C.
You load a dictionary of words into your cracking program
D.
You create hashes of a large number of words and compare it with the encrypted passwords
E.
You wait until the password expires
You attempt every single possibility until you exhaust all possible combinations or discover the password
A penetration tester is conducting a port scan on a specific host. The tester found several
ports opened that were confusing in concluding the Operating System (OS) version
installed. Considering that NMAP result below, which of the following is likely to be installed
on the target machine by the OS? Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan
report for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT
STATE SERVICE 21/tcp open ftp 23/tcp open telnet 80/tcp open http 139/tcp open netbiosssn
515/tcp open 631/tcp open ipp 9100/tcp open MAC Address: 00:00:48:0D:EE:8
A.
The host is likely a Linux machine.
B.
The host is likely a printer.
C.
The host is likely a router.
D.
The host is likely a Windows machine.
The host is likely a printer.
Attacker Steve targeted an organization's network with the aim of redirecting the company's
web traffic to another malicious website. To achieve this goal, Steve performed DNS cache
poisoning by exploiting the vulnerabilities In the DNS server software and modified the
original IP address of the target website to that of a fake website. What is the technique
employed by Steve to gather information for identity theft?
A.
Pretexting
B.
Pharming
C.
Wardriving
D.
Skimming
Pharming
Explanation: A pharming attacker tries to send a web site’s traffic to a faux website
controlled by the offender, typically for the aim of collection sensitive data from victims or
putting in malware on their machines. Attacker tend to specialize in making look-alike
ecommerce and digital banking websites to reap credentials and payment card data.
Though they share similar goals, pharming uses a special technique from phishing.
“Pharming attacker are targeted on manipulating a system, instead of tricking people into
reaching to a dangerous web site,” explains David Emm, principal security man of science
at Kaspersky. “When either a phishing or pharming attacker is completed by a criminal,
they need a similar driving issue to induce victims onto a corrupt location, however the
mechanisms during which this is often undertaken are completely different.”
Which of the following program infects the system boot sector and the executable files at
the same time?
A.
Polymorphic virus
B.
Stealth virus
C.
Multipartite Virus
D.
Macro virus
Multipartite Virus
Page 27 out of 104 Pages |
Previous |