What should you do next?
You want to know whether a packet filter is in front of 192.168.1.10. Pings to 192.168.1.10 don’t get answered. A basic nmap scan of 192.168.1.10 seems to hang without returning any information. What should you do next?
A distributed port scan operates by:
A distributed port scan operates by:
what would you infer from this scan?
Neil notices that a single address is generating traffic from its port 500 to port 500 of several other machines on the network. This scan is eating up most of the network bandwidth and Neil is concerned. As a security professional, what would you infer from this scan?
Which of the following commands will help you achieve this?
You are concerned that someone running PortSentry could block your scans, and you decide to slow your scans so that no one detects them. Which of the following commands will help you achieve this?
When you stop your scan, the smurf attack event stops showing up on the organization’s IDS monitor. How
While performing ping scans into a target network you get a frantic call from the organization’s security team. They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization’s IDS monitor. How can you modify your scan to prevent triggering this event in the IDS?
Why do you think this occurs?
You are manually conducting Idle Scanning using Hping2. During your scanning you notice that almost every query increments the IPID regardless of the port being queried. One or two of the queries cause the IPID to increment by more than one value. Why do you think this occurs?
Which among the following can be used to get this output?
While reviewing the result of scanning run against a target network you come across the following:
Which among the following can be used to get this output?
Which of the following Nmap commands would be used to perform a UDP scan of the lower 1024 ports?
Which of the following Nmap commands would be used to perform a UDP scan of the lower 1024 ports?
Which organization coordinates computer crime investigations throughout the United States?
Sandra is the security administrator of ABC.com. One day she notices that the ABC.com Oracle database server has been compromised and customer information along with financial data has been stolen. The financial loss will be estimated in millions of dollars if the database gets into the hands of competitors. Sandra wants to report this crime to the law enforcement agencies immediately.
Which organization coordinates computer crime investigations throughout the United States?
Name two software tools used for OS guessing.(Choose two.
Name two software tools used for OS guessing.(Choose two.