Identify the correct statement related to the above Web Server installation?
Which of the following attacks takes best advantage of an existing authenticated connection?
Which of the following attacks takes best advantage of an existing authenticated connection?
what will be the response?
If an attacker’s computer sends an IPID of 24333 to a zombie (Idle Scanning) computer on a
closed port, what will be the response?
Why is this considered to be more secure than Basic authentication?
Tess King is making use of Digest Authentication for her Web site. Why is this considered to be
more secure than Basic authentication?
What is Jacob seeing here?
Jacob is looking through a traffic log that was captured using Wireshark. Jacob has come across
what appears to be SYN requests to an internal computer from a spoofed IP address. What is
Jacob seeing here?
Which of the following options would be your current privileges?
You have successfully run a buffer overflow attack against a default IIS installation running on a
Windows 2000 Server. The server allows you to spawn a shell. In order to perform the actions
you intend to do, you need elevated permission. You need to know what your current privileges
are within the shell. Which of the following options would be your current privileges?
Which of the following Registry location does a Trojan add entries to make it persistent on Windows 7?
which holds the least risk of detection?
You wish to determine the operating system and type of web server being used. At the same time
you wish to arouse no suspicion within the target organization.
While some of the methods listed below work, which holds the least risk of detection?
Which of the following command results in packets that will appear to originate from the system at 10.8.8.8?
Perimeter testing means determining exactly what your firewall blocks and what it allows. To
conduct a good test, you can spoof source IP addresses and source ports. Which of the following
command results in packets that will appear to originate from the system at 10.8.8.8? Such a
packet is useful for determining whether the firewall is allowing random packets in or out of your
network.
Which of the following tools can be used for that purpose?
Bart is looking for a Windows NT/2000/XP command-line tool that can be used to assign, display,
or modify ACL’s (access control lists) to files or folders and also one that can be used within batch
files.
Which of the following tools can be used for that purpose? (Choose the best answer)