Which type of attack occurs when a hacker obtains passwords and other information from legitimate transactions
Which type of attack occurs when a hacker obtains passwords and other information from legitimate transactions?
Which of the following is a way to get around a firewall to intrude into a secure network from a remote locati
Which of the following is a way to get around a firewall to intrude into a secure network from a remote location?
Which one of the following choices lists the two services?
Most hackers run two services first learn information about a 1D0-470
computer or Windows server attached to the Internet or intranet. These services enable hackers to find weaknesses in order to infiltrate the computer or network. Which one of the following choices lists the two services?
What common target can be reconfigured to disable an interface and provide inaccurate IP addresses over the In
What common target can be reconfigured to disable an interface and provide inaccurate IP addresses over the Internet?
Which type of attack does this action help to prevent?
Lucy obtains the latest stable versions of server, services or applications. Which type of attack does this action help to prevent?
What host-level information would you want to obtain so you can exploit defaults and patches?
What host-level information would you want to obtain so you can exploit defaults and patches?
What is the final step in assessing the risk of network intrusion from an internal or external source?
What is the final step in assessing the risk of network intrusion from an internal or external source?
What is this type of attack called?
A file is replace by another file that provides the same service but also has a secret operation that is meant to subvert security. What is this type of attack called?
Which type of attack uses a simple or complex program that self-replicates and/or deposits a payload on a remo
Which type of attack uses a simple or complex program that self-replicates and/or deposits a payload on a remote or local computer?
Which type of attack can use a worm or packet sniffer to crash systems, causing low resources and/or consuming
Which type of attack can use a worm or packet sniffer to crash systems, causing low resources and/or consuming bandwidth?