Data hiding analysis can be useful in
Data hiding analysis can be useful in
(Choose two)
Bob, an Administrator at XYZ was furious when he discovered that his buddy Trent, has launched
a session hijack attack against his network, and sniffed on his communication, including
administrative tasks suck as configuring routers, firewalls, IDS, via Telnet.
Bob, being an unhappy administrator, seeks your help to assist him in ensuring that attackers such
as Trent will not be able to launch a session hijack in XYZ.
Based on the above scenario, please choose which would be your corrective measurement
actions. (Choose two)
which protocol to transfer the certificate in a secure manner?
Smart cards use which protocol to transfer the certificate in a secure manner?
Which one of the following techniques can be very effective at avoiding proper detection?
Network Intrusion Detection systems can monitor traffic in real time on networks.
Which one of the following techniques can be very effective at avoiding proper detection?
Which rule would best fit this requirement?
A company firewall engineer has configured a new DMZ to allow public systems to be located
away from the internal network. The engineer has three security zones set:
Untrust (Internet) – (Remote network = 217.77.88.0/24)
DMZ (DMZ) – (11.12.13.0/24)
Trust (Intranet) – (192.168.0.0/24)
The engineer wants to configure remote desktop access from a fixed IP on the remote network to
a remote desktop server in the DMZ. Which rule would best fit this requirement?
What do you conclude from the nmap results below?
What do you conclude from the nmap results below?
Staring nmap V. 3.10ALPHA0 (www.insecure.org/map/)
(The 1592 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
25/tcp open smtp
80/tcp open http
443/tcp open https
Remote operating system guess: Too many signatures match the reliability guess the OS. Nmap
run completed – 1 IP address (1 host up) scanned in 91.66 seconds
When comparing the testing methodologies of Open Web Application Security Project (OWASP) and Open Source Secu
When comparing the testing methodologies of Open Web Application Security Project (OWASP)
and Open Source Security Testing Methodology Manual (OSSTMM) the main difference is
What is the probable cause of Bill’s problem?
Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been
able to spawn an interactive shell and plans to deface the main web page. He first attempts to use
the “Echo” command to simply overwrite index.html and remains unsuccessful. He then attempts
to delete the page and achieves no progress. Finally, he tries to overwrite it with another page
again in vain.
What is the probable cause of Bill’s problem?
Which of the following is a protocol that is prone to a man-in-the-middle (MITM) attack and maps a 32-bit addr
Which of the following is a protocol that is prone to a man-in-the-middle (MITM) attack and maps a
32-bit address to a 48-bit address?
Which of the choices below indicate the other features offered by Snort?
Snort is an open source Intrusion Detection system. However, it can also be used for a few other
purposes as well.
Which of the choices below indicate the other features offered by Snort?