Larry plans on shutting down the city’s network using BGP devices and zombies? What type of Penetration
Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city’s network using BGP devices and zombies? What type of Penetration Testing is Larry planning to carry out?
What information will you be able to gather?
As a security analyst you setup a false survey website that will require users to create a username and a strong password. You send the link to all the employees of the company. What information will you be able to gather?
On Linux/Unix based Web servers, what privilege should the daemon service be run under?
On Linux/Unix based Web servers, what privilege should the daemon service be run under?
What is Terri trying to accomplish by sending this IP packet?
Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri’s duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company’s switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?
What networking protocol language should she learn that routers utilize?
Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?
What information will he be able to gather from this?
John and Hillary works at the same department in the company. John wants to find out Hillary’s network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found. What information will he be able to gather from this?
Why PDF passwords do not offer maximum protection?
Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers. Bill protects the PDF documents with a password and sends them to their intended recipients.
Why PDF passwords do not offer maximum protection?
What type of attack has the technician performed?
Paul’s company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?
What information will he be able to gather from this?
John and Hillary works at the same department in the company. John wants to find out Hillary’s network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found.
What information will he be able to gather from this?
What could have prevented this information from being stolen from the laptops?
Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops?