what is the RID of the true administrator account?
When working with Windows systems, what is the RID of the true administrator account?
What is the length of the MD5 hash?
What do you think was the most likely cause behind this sudden increase in traffic?
You have been called to investigate a sudden increase in network traffic at XYZ. It seems that the
traffic generated was too heavy that normal business functions could no longer be rendered to
external employees and clients. After a quick investigation, you find that the computer has
services running attached to TFN2k and Trinoo software. What do you think was the most likely
cause behind this sudden increase in traffic?
Which type of password cracking technique works like dictionary attack but adds some numbers and symbols to th
Which type of password cracking technique works like dictionary attack but adds some numbers
and symbols to the words from the dictionary and tries to crack the password?
What type of attack is Henry using?
Henry is an attacker and wants to gain control of a system and use it to flood a target system with
requests, so as to prevent legitimate users from gaining access. What type of attack is Henry
using?
What command would you type to OS fingerprint a server using the command line?
What is the technique that Eve used in the case above?
Eve decides to get her hands dirty and tries out a Denial of Service attack that is relatively new to
her. This time she envisages using a different kind of method to attack Brownies Inc. Eve tries to
forge the packets and uses the broadcast address. She launches an attack similar to that of
fraggle. What is the technique that Eve used in the case above?
What do you call a pre-computed hash?
What do you call a pre-computed hash?
What should Peter do to prevent a smurf attack?
Peter is a Network Admin. He is concerned that his network is vulnerable to a smurf attack. What
should Peter do to prevent a smurf attack?
Select the best answer.
Why attackers use proxy servers?
Why attackers use proxy servers?