which of these is the “exploit”?
In the following example, which of these is the "exploit"?
Today, Microsoft Corporation released a security notice. It detailed how a person could bring down the Windows 2003 Server operating system, by sending malformed packets to it. They detailed how this malicious process had been automated using basic scripting. Even worse, the new automated method for bringing down the server has already been used to perform denial of service attacks on many large commercial websites.
Select the best answer.
which of the following are true statements that you would point out?
One of your junior administrator is concerned with Windows LM hashes and password cracking. In your discussion with them, which of the following are true statements that you would point out?
Select the best answers.
What file would you find the information in and where?
You are a Administrator of Windows server. You want to find the port number for POP3. What file would you find the information in and where?
Select the best answer.
_____ is the process of converting something from one representation to the simplest form. It deals with the w
_____ is the process of converting something from one representation to the simplest form. It deals with the way in which systems convert data from one form to another.
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
How do you disable LM authentication in Windows XP?
LM authentication is not as strong as Windows NT authentication so you may want to disable its use, because an attacker eavesdropping on network traffic will attack the weaker protocol. A successful attack can compromise the user’s password. How do you disable LM authentication in Windows XP?
Which of the following steganography utilities exploits the nature of white space and allows the user to conce
Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces?
Which of the following is NOT a means that can be used to minimize or protect against such an attack?
Attackers can potentially intercept and modify unsigned SMB packets, modify the traffic and forward it so that the server might perform undesirable actions. Alternatively, the attacker could pose as the server or client after a legitimate authentication and gain unauthorized access to data. Which of the following is NOT a means that can be used to minimize or protect against such an attack?
What hacking attack is challenge/response authentication used to prevent?
What hacking attack is challenge/response authentication used to prevent?
What does the following command in netcat do?
What does the following command in netcat do?
nc -l -u -p 55555 < /etc/passwd