Which of the following systems would not respond correctly to an nmap XMAS scan?
Which of the following systems would not respond correctly to an nmap XMAS scan?
Windows is dangerously insecure when unpacked from the box, and there are a few things that you must do before
You just purchased the latest DELL computer, which comes pre-installed with Windows 7,
McAfee antivirus software and a host of other applications. You want to connect Ethernet wire to
your cable modem and start using the computer immediately. Windows is dangerously insecure
when unpacked from the box, and there are a few things that you must do before you use it.
Use the traceroute results shown above to answer the following question: The perimeter security at targetcor
what is the definition of a Wrapper?
In the context of Trojans, what is the definition of a Wrapper?
What should be your next step to identify the OS?
While attempting to discover the remote operating system on the target computer, you receive the
following results from an nmap scan:
Remote operating system guess: Too many signatures match to reliably guess the OS.
Nmap run completed — 1 IP address (1 host up) scanned in 277.483 seconds
What should be your next step to identify the OS?
Which step would you perform to detect this type of Trojan?
which of the following sets of requests does it send to the target device?
When Nmap performs a ping sweep, which of the following sets of requests does it send to the
target device?
Which type of hacker represents the highest risk to your network?
Which type of hacker represents the highest risk to your network?
_________ is one of the programs used to wardial.
_________ is one of the programs used to wardial.
What type of insider threat would Shayla be considered?
Shayla is an IT security consultant, specializing in social engineering and external penetration
tests. Shayla has been hired on by Treks Avionics, a subcontractor for the Department of Defense.
Shayla has been given authority to perform any and all tests necessary to audit the company’s
network security.
No employees for the company, other than the IT director, know about Shayla’s work she will be
doing. Shayla’s first step is to obtain a list of employees through company website contact pages.
Then she befriends a female employee of the company through an online chat website. After
meeting with the female employee numerous times, Shayla is able to gain her trust and they
become friends. One day, Shayla steals the employee’s access badge and uses it to gain
unauthorized access to the Treks Avionics offices.
What type of insider threat would Shayla be considered?