How would you disable file extensions in Apache servers?
File extensions provide information regarding the underlying server technology. Attackers can use
this information to search vulnerabilities and launch attacks. How would you disable file extensions
in Apache servers?
what is considered a brute force attack?
When discussing passwords, what is considered a brute force attack?
What is a good example of a programming error that Bob can use to explain to the management how encryption wil
Bob has a good understanding of cryptography, having worked with it for many years.
Cryptography is used to secure data from specific threats, but it does not secure the application
from coding errors. It can provide data privacy; integrity and enable strong authentication but it
cannot mitigate programming errors. What is a good example of a programming error that Bob can
use to explain to the management how encryption will not address all their security concerns?
Which of the following are well know password-cracking programs?
Which of the following are well know password-cracking programs?(Choose all that apply.
What defensive measures will you take to protect your network from these attacks?
Finding tools to run dictionary and brute forcing attacks against FTP and Web servers is an easy
task for hackers. They use tools such as arhontus or brutus to break into remote servers.
A command such as this, will attack a given 10.0.0.34 FTP and Telnet servers simultaneously with
a list of passwords and a single login namE. linksys. Many FTP-specific password-guessing tools
are also available from major security sites.
What defensive measures will you take to protect your network from these attacks?
Password cracking programs reverse the hashing process to recover passwords.(True/False.
Password cracking programs reverse the hashing process to recover passwords.(True/False.
If the two numbers p and q are discovered through a _____________ process, then the private key can be derived
One of the most common and the best way of cracking RSA encryption is to begin to derive the
two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p
and q are discovered through a _____________ process, then the private key can be derived.
how best you can achieve this objective?
While examining audit logs, you discover that people are able to telnet into the SMTP server on
port 25. You would like to block this, though you do not see any evidence of an attack or other
wrong doing. However, you are concerned about affecting the normal functionality of the email
server. From the following options choose how best you can achieve this objective?
Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Serve
Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured
on Web Servers.
Which of the following are known weaknesses of LM?
Windows LAN Manager (LM) hashes are known to be weak. Which of the following are known
weaknesses of LM? (Choose three)