PrepAway - Latest Free Exam Questions & Answers

Tag: f

According to the CEH methodology, what is the next step to be performed after footprinting?

According to the CEH methodology, what is the next step to be performed after footprinting?

How do you prevent a hacker from launching FIN, NULL, and X-MAS scans on your network?

Port scans are often used to profile systems before they are attacked. Knowing what ports are open allows an attacker to determine which services can be attacked.
How do you prevent a hacker from launching FIN, NULL, and X-MAS scans on your network?

How would you protect from these attacks?

Take a look at the following attack on a Web Server using obstructed URL:
http://www.example.com/script.ext?template=%2e%2e%2f%2e%2e%2f%2e%2e%2f%65%74%63 %2f%70%61%73%73%77%64
This request is made up of:
.%2e%2e%2f%2e%2e%2f%2e%2e%2f = ../../../
.%65%74%63 = etc
.%2f = /
.%70%61%73%73%77%64 = passwd
How would you protect from these attacks?

What kind of Denial of Service attack was best illustrated in the scenario above?

Bob was frustrated with his competitor, Brownies Inc., and decided to launch an attack that would result in serious financial losses. He planned the attack carefully and carried out the attack at the appropriate moment. Meanwhile, Trent, an administrator at Brownies Inc., realized that their main financial transaction server had been attacked. As a result of the attack, the server crashed and Trent needed to reboot the system, as no one was able to access the resources of the company. This process involves human interaction to fix it. What kind of Denial of Service attack was best illustrated in the scenario above?

What hacking attack is challenge/response authentication used to prevent?

What hacking attack is challenge/response authentication used to prevent?


Page 2 of 3123