What will the following URL produce in an unpatched IIS Web Server?
why is it important to set each access point on a different channel?
When setting up a wireless network with multiple access points, why is it important to set each
access point on a different channel?
how will the packet get to its proper destination?
A packet is sent to a router that does not have the packet destination address in its route table,
how will the packet get to its properA packet is sent to a router that does not have the packet?
destination address in its route table, how will the packet get to its proper destination?
What type of Penetration Testing is Larry planning to carry out?
Larry is an IT consultant who works for corporations and government agencies. Larry plans on
shutting down the city’s network using BGP devices and ombies? What type of Penetration
Testing is Larry planning to carry out?
What is this information posted on the job website considered?
You are a security analyst performing reconnaissance on a company you will be carrying out a
penetration test for. You conduct a search for IT jobs on Dice.com and find the following
information for an open position:
7+ years experience in Windows Server environment
5+ years experience in Exchange 2000/2003 environment
Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting
software are required MCSA desired,
MCSE, CEH preferred
No Unix/Linux Experience needed
What is this information posted on the job website considered?
what state are these ports?
Michael works for Kimball Construction Company as senior security analyst. As part of yearly
security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS
scan and most of the ports scanned do not give a response. In what state are these ports?
What information will he be able to gather from this?
John and Hillary works at the same department in the company. John wants to find out Hillary’s
network password so he can take a look at her documents on the file server. He enables
Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference
source not found. What information will he be able to gather from this?
What is Terri trying to accomplish by sending this IP packet?
Terri works for a security consulting firm that is currently performing a penetration test on First
National Bank in Tokyo. Terri’s duties include bypassing firewalls and switches to gain access to
the network. Terri sends an IP packet to one of the company’s switches with ACK bit and the
source address of her machine set. What is Terri trying to accomplish by sending this IP packet?
What could be Tyler issue with his home wireless network?
Tyler is setting up a wireless network for his business that he runs out of his home. He has
followed all the directions from the ISP as well as the wireless router manual. He does not have
any encryption set and the SSID is being broadcast. On his laptop, he can pick up the wireless
signal for short periods of time, but then the connection drops and the signal goes away.
Eventually the wireless signal shows back up, but drops intermittently. What could be Tyler issue
with his home wireless network?
What are you trying to accomplish here?
You have compromised a lower-level administrator account on an Active Directory network of a
small company in Dallas, Texas. You discover Domain Controllers through enumeration. You
connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to
accomplish here?