What command can Charlie use to attempt this task?
Charlie is the network administrator for his company. Charlie just received a new Cisco router and
wants to test its capabilities out and to see if it might be susceptible to a DoS attack resulting in its
locking up. The IP address of the Cisco switch is 172.16.0.45. What command can Charlie use to
attempt this task?
Why Only 13 hosts send a reply while others do not?
One of the ways to map a targeted network for live hosts is by sending an ICMP ECHO request to
the broadcast or the network address. The request would be broadcasted to all hosts on the
targeted network. The live hosts will send an ICMP ECHO Reply to the attacker’s source IP
address.
You send a ping request to the broadcast address 192.168.5.255.
There are 40 computers up and running on the target network. Only 13 hosts send a reply while
others do not. Why?
What type of encryption does WPA2 use?
What type of encryption does WPA2 use?
What type of Port Scanning is this?
Attackers send an ACK probe packet with random sequence number, no response means port is
filtered (Stateful firewall is present) and RST response means the port is not filtered. What type of
Port Scanning is this?
What is the command used to create a binary log file using tcpdump?
What is the command used to create a binary log file using tcpdump?
Which port, when configured on a switch receives a copy of every packet that passes through it?
What is the IV key size used in WPA2?
What is the IV key size used in WPA2?
What type of session hijacking attack is shown in the exhibit?
What is the default Password Hash Algorithm used by NTLMv2?
What is the default Password Hash Algorithm used by NTLMv2?
What proxy tool has Gerald’s attacker used to cover their tracks?
Gerald, the Systems Administrator for Hyped Enterprises, has just discovered that his network has
been breached by an outside attacker. After performing routine maintenance on his servers, he
discovers numerous remote tools were installed that no one claims to have knowledge of in his
department. Gerald logs onto the management console for his IDS and discovers an unknown IP
address that scanned his network constantly for a week and was able to access his network
through a high-level port that was not closed. Gerald traces the IP address he found in the IDS
log to a proxy server in Brazil. Gerald calls the company that owns the proxy server and after
searching through their logs, they trace the source to another proxy server in Switzerland. Gerald
calls the company in Switzerland that owns the proxy server and after scanning through the logs
again, they trace the source back to a proxy server in China. What proxy tool has Gerald’s
attacker used to cover their tracks?