What does FIN in TCP flag define?
What does FIN in TCP flag define?
Which of the following represents the initial two commands that an IRC client sends to join an IRC network?
Which of the following represents the initial two commands that an IRC client sends to join an IRC network?
What is Eve trying to do?
Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate
Alice machine. From the command prompt, she types the following command.
For /f "tokens=1 %%a in (hackfile.txt) do net use * \10.1.2.3c$ /user:"Administrator" %%a
What is Eve trying to do?
What would you call this attack?
Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two.
What would you call this attack?
What kind of attack is Susan carrying on?
Susan has attached to her company’s network. She has managed to synchronize her boss’s sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. What kind of attack is Susan carrying on?
Which definition among those given below best describes a covert channel?
Which definition among those given below best describes a covert channel?
What did the following commands determine?
What did the following commands determine?
C : user2sid earth guest
S-1-5-21-343818398-789336058-1343024091-501
C:sid2user 5 21 343818398 789336058 1343024091 500
Name is Joe
Domain is EARTH
Which of the following tools are used for enumeration?
Which of the following tools are used for enumeration? (Choose three.)
Which DNS resource record can indicate how long any “DNS poisoning” could last?
Which DNS resource record can indicate how long any "DNS poisoning" could last?
How do you prevent DNS spoofing?
Let’s imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B. How do you prevent DNS spoofing? (Select the Best Answer.)