Why is that?
John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer
located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he
does not see any of the traffic produced by Firewalk. Why is that?
what type of IDS is being used?
When you are running a vulnerability scan on a network and the IDS cuts off your connection,
what type of IDS is being used?
What information will you be able to gather?
As a security analyst you setup a false survey website that will require users to create a username
and a strong password. You send the link to all the employees of the company. What information
will you be able to gather?
what privilege should the daemon service be run under?
On Linux/Unix based Web servers, what privilege should the daemon service be run under?
What has happened?
You are running through a series of tests on your network to check for any security vulnerabilities.
After normal working hours, you initiate a DoS attack against your external firewall. The firewall
quickly freezes up and becomes unusable. You then initiate an FTP connection from an external
IP into your internal network. The connection is successful even though you have FTP blocked at
the external firewall. What has happened?
What networking protocol language should she learn that routers utilize?
Kimberly is studying to be an IT security analyst at a vocational school in her town. The school
offers many different programming as well as networking languages. What networking protocol
language should she learn that routers utilize?
What type of attack has the technician performed?
Paul’s company is in the process of undergoing a complete security audit including logical and
physical security testing. After all logical tests were performed; it is now time for the physical round
to begin. None of the employees are made aware of this round of testing. The security-auditing
firm sends in a technician dressed as an electrician. He waits outside in the lobby for some
employees to get to work and follows behind them when they access the restricted areas. After
entering the main office, he is able to get into the server room telling the IT manager that there is a
problem with the outlets in that room. What type of attack has the technician performed?
What information will he be able to gather from this?
John and Hillary works at the same department in the company. John wants to find out Hillary’s
network password so he can take a look at her documents on the file server. He enables
Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference
source not found.
What information will he be able to gather from this?
What type of DoS attack is James testing against his network?
James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO
requests to the broadcast address of his network. What type of DoS attack is James testing
against his network?
What tool should you use?
You work as an IT security auditor hired by a law firm in Boston to test whether you can gain
access to sensitive information about the company’s clients. You have rummaged through their
trash and found very little information. You do not want to set off any alarms on their network, so
you plan on performing passive footprinting against their Web servers. What tool should you use?