PrepAway - Latest Free Exam Questions & Answers

Author: admin

What tool could Larry use to help evade traps like honeypots?

Larry is a criminal hacker with over 20 years of experience in breaking into systems. Larry’s main objective used to entail defacing government and big corporation websites with information they did not want released to the public. But within the last few years, Larry has found avenues of creating revenue through breaking into systems and selling the information. On numerous occasions, Larry was able to break into the networks of small local banks and glean sensitive customer information including names, social security numbers, bank account numbers, and PINs. Larry then sold this information through covert channels to dummy corporations based in Eastern Europe where cyber-law has not matured yet. Larry has been able to cover his tracks in the past, but with the rise of new technology such as honeypots, Larry is concerned about falling into traps set by security professionals.
What tool could Larry use to help evade traps like honeypots?

How would you detect these reflectors on your network?

Reflective DDoS attacks do not send traffic directly at the targeted host. Instead, they usually spoof the originating IP addresses and send the requests at the reflectors. These reflectors (usually routers or high-powered servers with a large amount of network resources at their disposal) then reply to the spoofed targeted traffic by sending loads and loads of data to the final target.
How would you detect these reflectors on your network?

Attacker creates a random source address for each packet SYN flag set in each packet is a request to open a ne

The SYN flood attack sends TCP connections requests faster than a machine can process them.
Attacker creates a random source address for each packet SYN flag set in each packet is a request to open a new connection to the server from the spoofed IP address
Victim responds to spoofed IP address, then waits for confirmation that never arrives (timeout wait is about 3 minutes)
Victim’s connection table fills up waiting for replies and ignores new connections Legitimate users are ignored and will not be able to access the server
How do you protect your network against SYN Flood attacks?

How would John protect his network from these types of attacks?

John runs a Web server, IDS and firewall on his network. Recently his Web server has been under constant hacking attacks. He looks up the IDS log files and sees no intrusion attempts but the Web server constantly locks up and needs rebooting due to various brute force and buffer overflow attacks but still the IDS alerts no intrusion whatsoever.
John becomes suspicious and views the Firewall logs and he notices huge SSL connections constantly hitting his Web server.
Hackers have been using the encrypted HTTPS protocol to send exploits to the Web server and that was the reason the IDS did not detect the intrusions.
How would John protect his network from these types of attacks?

How does traceroute map the route a packet travels from point A to point B?

How does traceroute map the route a packet travels from point A to point B?

What effective security solution will you recommend in this case?

You are the security administrator of Jaco Banking Systems located in Boston. You are setting up e-banking website (http://www.ejacobank.com) authentication system. Instead of issuing banking customer with a single password, you give them a printed list of 100 unique passwords. Each time the customer needs to log into the e-banking system website, the customer enters the next password on the list. If someone sees them type the password using shoulder surfing, MiTM or keyloggers, then no damage is done because the password will not be accepted a second time. Once the list of 100 passwords is almost finished, the system automatically sends out a new password list by encrypted e-mail to the customer.
You are confident that this security implementation will protect the customer from password abuse.
Two months later, a group of hackers called “HackJihad” found a way to access the one-time password list issued to customers of Jaco Banking Systems. The hackers set up a fake website (http://www.e-jacobank.com) and used phishing attacks to direct ignorant customers to it. The fake website asked users for their e-banking username and password, and the next unused entry from their one-time password sheet. The hackers collected 200 customer’s username/passwords this way. They transferred money from the customer’s bank account to various offshore accounts.
Your decision of password policy implementation has cost the bank with USD 925,000 to hackers. You immediately shut down the e-banking website while figuring out the next best security solution.
What effective security solution will you recommend in this case?


Page 146 of 231« First...102030...144145146147148...160170180...Last »