Topic 1: Exam Pool A
A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff
the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other
systems.
However, he is unable to capture any logons though he knows that other users are logging
in.
What do you think is the most likely reason behind this?
A.
There is a NIDS present on that segment.
B.
Kerberos is preventing it.
C.
Windows logons cannot be sniffed.
D.
L0phtcrack only sniffs logons to web servers.
Kerberos is preventing it.
Hackers often raise the trust level of a phishing message by modeling the email to look
similar to the internal email used by the target company. This includes using logos,
formatting, and names of the target company. The phishing message will often use the
name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?
A.
Exploration
B.
Investigation
C.
Reconnaissance
D.
Enumeration
Reconnaissance
What does the –oX flag do in an Nmap scan?
A.
Perform an eXpress scan
B.
Output the results in truncated format to the screen
C.
Output the results in XML format to a file
D.
Perform an Xmas scan
Output the results in XML format to a file
Explanation:
https://nmap.org/book/man-output.html
-oX <filespec> - Requests that XML output be directed to the given filename.
An Intrusion Detection System (IDS) has alerted the network administrator to a possibly
malicious sequence of packets sent to a Web server in the network’s external DMZ. The
packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool
can be used to determine if these packets are genuinely malicious or simply a false
positive?
A.
Protocol analyzer
B.
Network sniffer
C.
Intrusion Prevention System (IPS)
D.
Vulnerability scanner
Protocol analyzer
Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has
learnt to use these tools in his lab and is now ready for real world exploitation. He was able
to effectively intercept communications between the two entities and establish credentials
with both sides of the connections. The two remote ends of the communication never
notice that Eric is relaying the information between the two. What would you call this
attack?
A.
Interceptor
B.
Man-in-the-middle
C.
ARP Proxy
D.
Poisoning Attack
Man-in-the-middle
Page 27 out of 114 Pages |
Previous |