How do you disable LM authentication in Windows XP?
LM authentication is not as strong as Windows NT authentication so you may want to disable its use, because an attacker eavesdropping on network traffic will attack the weaker protocol. A successful attack can compromise the user’s password. How do you disable LM authentication in Windows XP?
Which of the following steganography utilities exploits the nature of white space and allows the user to conce
Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces?
Which of the following is NOT a means that can be used to minimize or protect against such an attack?
Attackers can potentially intercept and modify unsigned SMB packets, modify the traffic and forward it so that the server might perform undesirable actions. Alternatively, the attacker could pose as the server or client after a legitimate authentication and gain unauthorized access to data. Which of the following is NOT a means that can be used to minimize or protect against such an attack?
What file system vulnerability does the following command take advantage of?
What file system vulnerability does the following command take advantage of?
type c:anyfile.exe > c:winntsystem32calc.exe:anyfile.exe
What hacking attack is challenge/response authentication used to prevent?
What hacking attack is challenge/response authentication used to prevent?
What does the following command in netcat do?
What does the following command in netcat do?
nc -l -u -p 55555 < /etc/passwd
what is a ‘null’ user?
In the context of Windows Security, what is a ‘null’ user?
Fingerprinting an Operating System helps a cracker because:
Fingerprinting an Operating System helps a cracker because:
What is GINA?
What is GINA?
How would you resolve this situation?
You are the Security Administrator of Xtrinity, Inc. You write security policies and conduct assesments to protect the company’s network. During one of your periodic checks to see how well policy is being observed by the employees, you discover an employee has attached a modem to his telephone line and workstation. He has used this modem to dial in to his workstation, thereby bypassing your firewall. A security breach has occurred as a direct result of this activity. The employee explains that he used the modem because he had to download software for a department project. How would you resolve this situation?