What happens when one experiences a ping of death?
What happens when one experiences a ping of death?
Global deployment of RFC 2827 would help mitigate what classification of attack?
Global deployment of RFC 2827 would help mitigate what classification of attack?
Which one of the following instigates a SYN flood attack?
Which one of the following instigates a SYN flood attack?
Ethereal works best on ____________.
Ethereal works best on ____________.
Which of the following techniques can she use to gather information from the switched network or to disable so
Samantha was hired to perform an internal security test of pass4sure. She quickly realized that all networks are making use of switches instead of traditional hubs. This greatly limits her ability to gather information through network sniffing. Which of the following techniques can she use to gather information from the switched network or to disable some of the traffic isolation features of the switch? (Choose two)
A POP3 client contacts the POP3 server:
A POP3 client contacts the POP3 server:
Which responses would NOT be preferred by an experienced Security Manager?
A remote user tries to login to a secure network using Telnet, but accidently types in an invalid user name or password. Which responses would NOT be preferred by an experienced Security Manager? (multiple answer)
What would you infer from this alert?
Erik notices a big increase in UDP packets sent to port 1026 and 1027 occasionally. He enters the following at the command prompt. $ nc -l -p 1026 -u -v In response, he sees the following message. cell(?(c)???? STOPALERT77STOP! WINDOWS REQUIRES IMMEDIATE ATTENTION. Windows has found 47 Critical Errors. To fix the errors please do the following:
1.Download Registry Repair from: www.reg-patch.com
2.Install Registry Repair
3. Run Registry Repair
4. Reboot your computer FAILURE TO ACT NOW MAY LEAD TO DATA LOSS AND CORRUPTION!
What would you infer from this alert?
Sniffing is considered an active attack.
Sniffing is considered an active attack.