Assuring two systems that are using IPSec to protect traffic over the internet, what type of general attack co
Assuring two systems that are using IPSec to protect traffic over the internet, what type of general attack could compromise the data?
In the following example, which of these is the "exploit"?
In the following example, which of these is the “exploit”? Today, Microsoft Corporation released a security notice. It detailed how a person could bring down the Windows 2003 Server operating system, by sending malformed packets to it. They detailed how this malicious process had been automated using basic scripting. Even worse, the new automated method for bringing down the server has already been used to perform denial of service attacks on many large commercial websites. Select the best answer.
In your discussion with them, which of the following are true statements that you would point out?
One of your junior administrator is concerned with Windows LM hashes and password cracking. In your discussion with them, which of the following are true statements that you would point out? Select the best answers.
What file would you find the information in and where?
You are a Administrator of Windows server. You want to find the port number for POP3. What file would you find the information in and where? Select the best answer.
Why would you consider sending an email to an address that you know does not exist within the company you are
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?
Password cracking programs reverse the hashing process to recover passwords. (True/False.)
Password cracking programs reverse the hashing process to recover passwords. (True/False.)
Which of the following are well know password-cracking programs?
Which of the following are well know password-cracking programs? (Choose all that apply.)
When discussing passwords, what is considered a brute force attack?
When discussing passwords, what is considered a brute force attack?
How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?
How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?
What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?
What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?