A firewall protects networked computers from intentional hostile intrusion that could
compromise confidentiality or result in data corruption or denial of service. It examines all
traffic routed between the two networks to see if it meets certain criteria. If it does, it is
routed between the networks, otherwise it is stopped.
Why is an appliance-based firewall is more secure than those implemented on top of the
commercial operating system (Software based)?
A.
Appliance based firewalls cannot be upgraded
B.
Firewalls implemented on a hardware firewall are highly scalable
C.
Hardware appliances does not suffer from security vulnerabilities associated with the
underlying operating system
D.
Operating system firewalls are highly configured
Hardware appliances does not suffer from security vulnerabilities associated with the
underlying operating system
What is a difference between host-based intrusion detection systems (HIDS) and networkbased
intrusion detection systems (NIDS)?
A.
NIDS are usually a more expensive solution to implement compared to HIDS.
B.
Attempts to install Trojans or backdoors cannot be monitored by a HIDS whereas NIDS
can monitor and stop such intrusion events.
C.
NIDS are standalone hardware appliances that include network intrusion detection
capabilities whereas HIDS consist of software agents installed on individual computers
within the system.
D.
HIDS requires less administration and training compared to NIDS.
NIDS are standalone hardware appliances that include network intrusion detection
capabilities whereas HIDS consist of software agents installed on individual computers
within the system.
Metasploit framework in an open source platform for vulnerability research, development,
and penetration testing. Which one of the following metasploit options is used to exploit
multiple systems at once?
A.
NinjaDontKill
B.
NinjaHost
C.
RandomNops
D.
EnablePython
NinjaDontKill
A chipset is a group of integrated circuits that are designed to work together and are
usually marketed as a single product.” It is generally the motherboard chips or the chips
used on the expansion card. Which one of the following is well supported in most wireless
applications?
A.
Orinoco chipsets
B.
Prism II chipsets
C.
Atheros Chipset
D.
Cisco chipset
Prism II chipsets
In the process of hacking a web application, attackers manipulate the HTTP requests to
subvert the application authorization schemes by modifying input fields that relate to the
user ID, username, access group, cost, file names, file identifiers,etc. They first access the
web application using a low privileged account and then escalate privileges to access
protected resources. What attack has been carried out?
A.
XPath Injection Attack
B.
Authorization Attack
C.
Authentication Attack
D.
Frame Injection Attack
Authorization Attack
Reference:http://luizfirmino.blogspot.com/2011_09_01_archive.html(see authorization
attack)
Page 8 out of 40 Pages |
Previous |