what is a ‘null’ user?
In the context of Windows Security, what is a ‘null’ user?
Which port, when configured on a switch receives a copy of every packet that passes through it?
What does the following command in netcat do?
What does the following command in netcat do?
nc -l -u -p55555 < /etc/passwd
What is the IV key size used in WPA2?
What is the IV key size used in WPA2?
What hacking attack is challenge/response authentication used to prevent?
What hacking attack is challenge/response authentication used to prevent?
What type of session hijacking attack is shown in the exhibit?
What file system vulnerability does the following command take advantage of?
What file system vulnerability does the following command take advantage of?
type c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe
What is the default Password Hash Algorithm used by NTLMv2?
What is the default Password Hash Algorithm used by NTLMv2?
Which of the following is NOT a means that can be used to minimize or protect against such an attack?
Attackers can potentially intercept and modify unsigned SMB packets, modify the traffic and
forward it so that the server might perform undesirable actions. Alternatively, the attacker could
pose as the server or client after a legitimate authentication and gain unauthorized access to data.
Which of the following is NOT a means that can be used to minimize or protect against such an
attack?
What proxy tool has Gerald’s attacker used to cover their tracks?
Gerald, the Systems Administrator for Hyped Enterprises, has just discovered that his network has
been breached by an outside attacker. After performing routine maintenance on his servers, he
discovers numerous remote tools were installed that no one claims to have knowledge of in his
department. Gerald logs onto the management console for his IDS and discovers an unknown IP
address that scanned his network constantly for a week and was able to access his network
through a high-level port that was not closed. Gerald traces the IP address he found in the IDS
log to a proxy server in Brazil. Gerald calls the company that owns the proxy server and after
searching through their logs, they trace the source to another proxy server in Switzerland. Gerald
calls the company in Switzerland that owns the proxy server and after scanning through the logs
again, they trace the source back to a proxy server in China. What proxy tool has Gerald’s
attacker used to cover their tracks?