Active scanning methodology involves ____________and waiting for responses from available wireless networks.
Wireless network discovery tools use two different methodologies to detect, monitor and log a
WLAN device (i.e. active scanning and passive scanning). Active scanning methodology involves
____________and waiting for responses from available wireless networks.
Damaged portions of a disk on which no read/Write operation can be performed is known as ______________.
Damaged portions of a disk on which no read/Write operation can be performed is known as
______________.
Which of the following element specifies the dimensions, compression type, and color format for the bitmap?
BMP (Bitmap) is a standard file format for computers running the Windows operating system. BMP
images can range from black and white (1 bit per pixel) up to 24 bit color (16.7 million colors).
Each bitmap file contains header, the RGBQUAD array, information header, and image data.
Which of the following element specifies the dimensions, compression type, and color format for
the bitmap?
Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing att
Which of the following countermeasure can specifically protect against both the MAC Flood and
MAC Spoofing attacks?
What technique does Jimmy use to compromise a database?
Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines
to create or alter SQL commands to gain access to private data or execute commands in the
database. What technique does Jimmy use to compromise a database?
What is this technique called?
This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and
the IDS will not spot the true nature of the fully assembled datagram. The datagram is not
reassembled until it reaches its final destination. It would be a processor-intensive task for IDS to
reassemble all fragments itself, and on a busy system the packet will slip through the IDS onto the
network. What is this technique called?
How would you prevent such type of attacks?
This type of Port Scanning technique splits TCP header into several packets so that the packet filters are not
This type of Port Scanning technique splits TCP header into several packets so that the packet
filters are not able to detect what the packets intends to do.
How would you call this type of activity?
Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in
order to find some information about the target they are attempting to penetrate. How would you
call this type of activity?
which situations would you want to use anonymizer?
Anonymizer sites access the Internet on your behalf, protecting your personal information from
disclosure. An anonymizer protects all of your computer’s identifying information while it surfs for
you, enabling you to remain at least one step removed from the sites you visit.
You can visit Web sites without allowing anyone to gather information on sites visited by you.
Services that provide anonymity disable pop-up windows and cookies, and conceal visitor’s IP
address.
These services typically use a proxy server to process each HTTP request. When the user
requests a Web page by clicking a hyperlink or typing a URL into their browser, the service
retrieves and displays the information using its own server. The remote server (where the
requested Web page resides) receives information on the anonymous Web surfing service in
place of your information.
In which situations would you want to use anonymizer? (Select 3 answers)