Which of the choices below are the proper features offered by Snort?
Snort is an open source Intrusion Detection System. However, it can also be used for a few other purposes such as a sniffer. Which of the choices below are the proper features offered by Snort?
Which of the following options would indicate the best course of action for John?
John wants to try a new hacking tool on his Linux system. As the application comes from a site in his untrusted zone, John wants to ensure that the downloaded tool has not been Trojaned. Which of the following options would indicate the best course of action for John?
Which of the following comes as one of the last steps that should be taken to ensure that the compromise canno
An attacker has successfully compromised a remote computer. Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem?
What would be the name of this tool?
John is using a special tool on his Linux platform that has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI scripts. Moreover, the database detects DDoS zombies and Trojans as well. What would be the name of this tool?
What port do you send the email to on the company SMTP server?
You are working in the security Department of law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on the company SMTP server?
This is original file structure database that Microsoft originally designed for floppy disks. It is written to
This is original file structure database that Microsoft originally designed for floppy disks. It is written to the outermost track of a disk and contains information about each file stored on the drive.
What should you do when approached by a reporter about a case that you are working on or have worked on?
What should you do when approached by a reporter about a case that you are working on or have worked on?
Which of the following refers to the data that might still exist in a cluster even though the original file ha
Which of the following refers to the data that might still exist in a cluster even though the original file has been overwritten by another file?
Where did the incident team go wrong?
A state department site was recently attacked and all the servers had their disks erased. The incident response team sealed the area and commenced investigation. During evidence collection they came across a zip disks that did not have the standard labeling on it. The incident team ran the disk on an isolated system and found that the system disk was accidentally erased. They decided to call in the FBI for further investigation. Meanwhile, they short listed possible suspects including three summer interns. Where did the incident team go wrong?
Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?
Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security. Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?