What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?
What is correct about digital signatures?
What is correct about digital signatures?
which port scanning technique cannot be used?
If there is an Intrusion Detection System (IDS) in intranet, which port scanning technique cannot be used?
which contains interesting and attractive content like …
Scenario:
1. Victim opens the attacker’s web site.
2. Attacker sets up a web site which contains interesting and attractive content like ‘Do you want to make
$1000 in a day?’.
3. Victim clicks to the interesting and attractive content url.
4. Attacker creates a transparent ‘iframe’ in front of the url which victim attempt to click, so victim thinks that
he/she clicks to the ‘Do you want to make $1000 in a day?’ url but actually he/she clicks to the content or url
that exists in the transparent ‘iframe’ which is setup by the attacker.
What is the name of the attack which is mentioned in the scenario?
What network security concept requires multiple layers …
What network security concept requires multiple layers of security controls to be placed throughout an IT
infrastructure, which improves the security posture of an organization to defend against malicious attacks or
potential vulnerabilities?
What did the hacker accomplish?
Look at the following output. What did the hacker accomplish?
; <<>> DiG 9.7.-P1 <<>> axfr domam.com @192.168.1.105
;; global options: +cmd
domain.com. 3600 IN SOA srv1.domain.com. hostsrv1.domain.com. 131 900 600 86400 3600
domain.com. 600 IN A 192.168.1.102
domain.com. 600 IN A 192.168.1.105
domain.com. 3600 IN NS srv1.domain.com.
domain.com. 3600 IN NS srv2.domain.com.
vpn.domain.com. 3600 IN A 192.168.1.1
server.domain.com. 3600 IN A 192.168.1.3
office.domain.com. 3600 IN A 192.168.1.4
remote.domain.com. 3600 IN A 192.168. 1.48
support.domain.com. 3600 IN A 192.168.1.47
ns1.domain.com. 3600 IN A 192.168.1.41
ns2.domain.com. 3600 IN A 192.168.1.42
ns3.domain.com. 3600 IN A 192.168.1.34
ns4.domain.com. 3600 IN A 192.168.1.45
srv1.domain.com. 3600 IN A 192.168.1.102
srv2.domain.com. 1200 IN A 192.168.1.105
domain.com. 3600 INSOA srv1.domain.com. hostsrv1.domain.com. 131 900 600 86400 3600;; Query time: 269 msec
;; SERVER: 192.168.1.105#53(192.168.1.105)
;; WHEN: Sun Aug 11 20:07:59 2013
;; XFR size: 65 records (messages 65, bytes 4501)
What measure on behalf of the legitimate admin can miti…
An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as
part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?
Which of the following best describes this type of system?
Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the
following best describes this type of system?
Collective IPSec does everything except.
Internet Protocol Security IPSec is actually a suite of protocols. Each protocol within the suite provides different
functionality. Collective IPSec does everything except.
What type of message sends the client to the server in …
The establishment of a TCP connection involves a negotiation called 3 way handshake. What type of message
sends the client to the server in order to begin this negotiation?