Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or othe
Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:
Which of the following filesystem is used by Mac OS X?
Which of the following filesystem is used by Mac OS X?
When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS
When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?
What is Simon trying to accomplish here?
Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company’s network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?
What will the following command produce on a website login page?
What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = ‘someone@somehwere.com’; DROP TABLE members; –‘
You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from othe
You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should you open for SNMP to work through Firewalls (Select 2)
What is the result of this test?
You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says:
“This is a test.” What is the result of this test?
If an attacker’s computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning,
If an attacker’s computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?
In what state are these ports?
Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?