Which of the following are potential attacks on cryptography?
Which of the following are potential attacks on cryptography? (Select 3)
Which of the following is a characteristic of Public Key Infrastructure (PKI)?
Which of the following is a characteristic of Public Key Infrastructure (PKI)?
What is a primary advantage a hacker gains by using encryption or programs such as Loki?
What is a primary advantage a hacker gains by using encryption or programs such as Loki?
What statement is true regarding LM hashes?
What statement is true regarding LM hashes?
What is the tool Firewalk used for?
What is the tool Firewalk used for?
What is a successful method for protecting a router from potential smurf attacks?
What is a successful method for protecting a router from potential smurf attacks?
What can be inferred from this output?
Which of the following tools will scan a network to perform vulnerability checks and compliance auditing?
Which of the following tools will scan a network to perform vulnerability checks and compliance
auditing?
how can you detect these sniffing interfaces?
During the intelligence gathering phase of a penetration test, you come across a press release by
a security products vendor stating that they have signed a multi-million dollar agreement with the
company you are targeting. The contract was for vulnerability assessment tools and network
based IDS systems. While researching on that particular brand of IDS you notice that its default
installation allows it to perform sniffing and attack analysis on one NIC and caters to its
management and reporting on another NIC. The sniffing interface is completely unbound from the
TCP/IP stack by default. Assuming the defaults were used, how can you detect these sniffing
interfaces?
authenticity, integrity, confidentiality and
The use of technologies like IPSec can help guarantee the followinG. authenticity, integrity,
confidentiality and