What is Paul seeing here?
Paul has just finished setting up his wireless network. He has enabled numerous security features
such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his
wireless router. Paul notices that when he uses his wireless connection, the speed is sometimes
54 Mbps and sometimes it is only 24Mbps or less. Paul connects to his wireless router’s
management utility and notices that a machine with an unfamiliar name is connected through his
wireless connection. Paul checks the router’s logs and notices that the unfamiliar machine has the
same MAC address as his laptop. What is Paul seeing here?
What two things will happen if a router receives an ICMP packet, which has a TTL value of 1, and the destinati
What two things will happen if a router receives an ICMP packet, which has a TTL value of 1, and
the destination host is several hops away? (Select 2 answers)
Which of the following LM hashes represents a password of less than 8 characters?
Which of the following LM hashes represents a password of less than 8 characters?
What can he infer from this file?
What technique could Harold use to sniff his agency’s switched network?
Harold is the senior security analyst for a small state agency in New York. He has no other
security professionals that work under him, so he has to do all the security-related tasks for the
agency. Coming from a computer hardware background, Harold does not have a lot of experience
with security methodologies and technologies, but he was the only one who applied for the
position. Harold is currently trying to run a Sniffer on the agency’s network to get an idea of what
kind of traffic is being passed around, but the program he is using does not seem to be capturing
anything. He pours through the Sniffer’s manual, but cannot find anything that directly relates to
his problem. Harold decides to ask the network administrator if he has any thoughts on the
problem. Harold is told that the Sniffer was not working because the agency’s network is a
switched network, which cannot be sniffed by some programs without some tweaking. What
technique could Harold use to sniff his agency’s switched network?
Which Windows system tool checks integrity of critical files that has been digitally signed by Microsoft?
Which Windows system tool checks integrity of critical files that has been digitally signed by
Microsoft?
How do cyber criminals infect a victim’s computer with bots?
Botnets are networks of compromised computers that are controlled remotely and surreptitiously
by one or more cyber criminals. How do cyber criminals infect a victim’s computer with bots?
(Select 4 answers)
What is the essential difference between an ‘Ethical Hacker’ and a ‘Cracker’?
What is the essential difference between an ‘Ethical Hacker’ and a ‘Cracker’?
What does the term “Ethical Hacking” mean?
What does the term “Ethical Hacking” mean?
Who is an Ethical Hacker?
Who is an Ethical Hacker?