PrepAway - Latest Free Exam Questions & Answers

Author: admin

Which of the following DoS attacks has John discovered as a vulnerability for the We-are-secure security netwo

John works as a professional Ethical Hacker. He has been assigned a project to test the security
of www.we-are-secure.com. He observes that the We-are-secure server is vulnerable to a special
type of DoS attack and he makes the following suggestions to the security authority to protect the
server from this DoS attack. The countermeasures against this type of DoS attack are as follows:
Disabling IP-directed broadcasts at the We-are-secure router
Configuring local computers so as not to respond to such ICMP packets that are configured to be
sent to IP broadcast addresses
Which of the following DoS attacks has John discovered as a vulnerability for the We-are-secure
security network?

Which of the following tools can John use to conduct it?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully completed the following pre-attack
phases while testing the security of the server:
Footprinting
Scanning
Now he wants to conduct the enumeration phase.
Which of the following tools can John use to conduct it?
Each correct answer represents a complete solution. Choose all that apply.


Page 180 of 231« First...102030...178179180181182...190200210...Last »