Which type of password cracking technique works like dictionary attack but adds some numbers and symbols to th
Which type of password cracking technique works like dictionary attack but adds some numbers
and symbols to the words from the dictionary and tries to crack the password?
What type of attack is Henry using?
Henry is an attacker and wants to gain control of a system and use it to flood a target system with
requests, so as to prevent legitimate users from gaining access. What type of attack is Henry
using?
What command would you type to OS fingerprint a server using the command line?
What is the technique that Eve used in the case above?
Eve decides to get her hands dirty and tries out a Denial of Service attack that is relatively new to
her. This time she envisages using a different kind of method to attack Brownies Inc. Eve tries to
forge the packets and uses the broadcast address. She launches an attack similar to that of
fraggle. What is the technique that Eve used in the case above?
What do you call a pre-computed hash?
What do you call a pre-computed hash?
What should Peter do to prevent a smurf attack?
Peter is a Network Admin. He is concerned that his network is vulnerable to a smurf attack. What
should Peter do to prevent a smurf attack?
Select the best answer.
Why attackers use proxy servers?
Why attackers use proxy servers?
why would you consider this as a false sense of security?
John is using tokens for the purpose of strong authentication. He is not confident that his security
is considerably strong.
In the context of Session hijacking why would you consider this as a false sense of security?
How would you keep intruders from getting sensitive information regarding the network devices using SNMP?
The SNMP Read-Only Community String is like a password. The string is sent along with each
SNMP Get-Request and allows (or denies) access to a device. Most network vendors ship their
equipment with a default password of “public”. This is the so-called “default public community
string”. How would you keep intruders from getting sensitive information regarding the network
devices using SNMP? (Select 2 answers)
What is the key advantage of Session Hijacking?
What is the key advantage of Session Hijacking?