How do you disable LM authentication in Windows XP?
LM authentication is not as strong as Windows NT authentication so you may want to disable its
use, because an attacker eavesdropping on network traffic will attack the weaker protocol. A
successful attack can compromise the user’s password. How do you disable LM authentication in
Windows XP?
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
It deals with the way in which systems convert data from one form to another.
_____ is the process of converting something from one representation to the simplest form. It
deals with the way in which systems convert data from one form to another.
Which type of attack is port scanning?
Which type of attack is port scanning?
What file would you find the information in and where?
You are a Administrator of Windows server. You want to find the port number for POP3. What file
would you find the information in and where?
Select the best answer.
which of the following are true statements that you would point out?
One of your junior administrator is concerned with Windows LM hashes and password cracking. In
your discussion with them, which of the following are true statements that you would point out?
Select the best answers.
which of these is the "exploit"?
In the following example, which of these is the “exploit”?
Today, Microsoft Corporation released a security notice. It detailed how a person could bring down
the Windows 2003 Server operating system, by sending malformed packets to it. They detailed
how this malicious process had been automated using basic scripting. Even worse, the new
automated method for bringing down the server has already been used to perform denial of
service attacks on many large commercial websites.
Select the best answer.
what type of general attack could compromise the data?
Assuring two systems that are using IPSec to protect traffic over the internet, what type of general
attack could compromise the data?
What is a Trojan Horse?
What is a Trojan Horse?
Which of the following commands accomplish this?
You want to use netcat to generate huge amount of useless network data continuously for various
performance testing between 2 hosts.
Which of the following commands accomplish this?