What does the command in the exhibit do in “Ettercap”?
Exhibit:
ettercap –NCLzs –quiet
What does the command in the exhibit do in “Ettercap”?
How can Fred accomplish this?
Fred is the network administrator for his company. Fred is testing an internal switch. From an
external IP address, Fred wants to try and trick this switch into thinking it already has established a
session with his computer. How can Fred accomplish this?
Which responses would NOT be preferred by an experienced Security Manager?
A remote user tries to login to a secure network using Telnet, but accidently types in an invalid
user name or password. Which responses would NOT be preferred by an experienced Security
Manager? (multiple answer)
which of the following statements describes Social Engineering best?
Within the context of Computer Security, which of the following statements describes Social
Engineering best?
A POP3 client contacts the POP3 server:
A POP3 client contacts the POP3 server:
what is a covert channel?
Which of the following techniques can she use to gather information from the switched network or to disable so
Samantha was hired to perform an internal security test of XYZ. She quickly realized that all
networks are making use of switches instead of traditional hubs. This greatly limits her ability to
gather information through network sniffing.
Which of the following techniques can she use to gather information from the switched network or
to disable some of the traffic isolation features of the switch? (Choose two)
How would an attacker exploit this design by launching TCP SYN attack?
When a normal TCP connection starts, a destination host receives a SYN (synchronize/start)
packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The
destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is
established. This is referred to as the “TCP three-way handshake.” While waiting for the ACK to
the SYN ACK, a connection queue of finite size on the destination host keeps track of connections
waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive
a few milliseconds after the SYN ACK. How would an attacker exploit this design by launching
TCP SYN attack?
Ethereal works best on ____________.
Ethereal works best on ____________.
What would Yancey be considered?
Yancey is a network security administrator for a large electric company. This company provides
power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15
years and has become very successful. One day, Yancey comes in to work and finds out that the
company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and
decides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down
the company once he has left. Yancey does not care if his actions land him in jail for 30 or more
years, he just wants the company to pay for what they are doing to him. What would Yancey be
considered?