Which are the easiest and most convincing ways to infect a computer?
Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the tr
SSL has been seen as the solution to a lot of common security problems. Administrator will often
time make use of SSL to encrypt communications from points A to point B. Why do you think this
could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic
between point A and B?
How can Jake gather network information in a secure manner?
Jake is a network administrator who needs to get reports from all the computer and network
devices on his network. Jake wants to use SNMP but is afraid that won’t be secure since
passwords and messages are in clear text. How can Jake gather network information in a secure
manner?
Can June use an antivirus program in this case and would it be effective against a polymorphic virus?
June, a security analyst, understands that a polymorphic virus has the ability to mutate and can
change its known viral signature and hide from signature-based antivirus programs. Can June use
an antivirus program in this case and would it be effective against a polymorphic virus?
Which of the following Exclusive OR transforms bits is NOT correct?
Which of the following Exclusive OR transforms bits is NOT correct?
How would you overcome the Firewall restriction on ICMP ECHO packets?
The traditional traceroute sends out ICMP ECHO packets with a TTL of one, and increments the
TTL until the destination has been reached. By printing the gateways that generate ICMP time
exceeded messages along the way, it is able to determine the path packets take to reach the
destination.
The problem is that with the widespread use of firewalls on the Internet today, many of the packets
that traceroute sends out end up being filtered, making it impossible to completely trace the path
to the destination.
How would you overcome the Firewall restriction on ICMP ECHO packets?
what will Snort look for in the payload of the suspected packets?
Simon is security analyst writing signatures for a Snort node he placed internally that captures all
mirrored traffic from his border firewall. From the following signature, what will Snort look for in the
payload of the suspected packets?
alert tcp $EXTERNAL_NET any -> $HOME_NET 27374 (msG. “BACKDOOR SIG – SubSseven
22″;flags: A+; content: “|0d0a5b52504c5d3030320d0a|”; reference:arachnids,485;) alert
Which of the listed technique will NOT be effective in evading Anti-Virus scanner?
You are trying to package a RAT Trojan so that Anti-Virus software will not detect it. Which of the
listed technique will NOT be effective in evading Anti-Virus scanner?
What will the following command produce on a website’s login page if executed successfully?
What will the following command produce on a website’s login page if executed successfully?
SELECT email, passwd, login_id, full_name FROM members WHERE email =
‘someone@somewhere.com’; DROP TABLE members; –‘
What would you call this kind of activity?
Oregon Corp is fighting a litigation suit with Scamster Inc. Oregon has assigned a private
investigative agency to go through garbage, recycled paper, and other rubbish at Scamster’s office
site in order to find relevant information. What would you call this kind of activity?