_____ is found in all versions of NTFS and is described as the ability to fork file data into existing files w
_____ is found in all versions of NTFS and is described as the ability to fork file data into existing files without affecting their functionality, size, or display to traditional file browsing utilities like dir or Windows Explorer
As a security tester, how would you discover what telephone numbers to dial-in to the router?
Wardialing is one of the oldest methods of gaining unauthorized access to the targeted systems, it is one of the dangers most commonly forgotten by network engineers and system administrators. A hacker can sneak past all the expensive firewalls and IDS and connect easily into the network. Through wardialing, an attacker searches for the devices located in the target network infrastructure that are also accessible through the telephone line.
‘Dial backup’ in routers is most frequently found in networks where redundancy is required. Dial-on-demand routing (DDR) is commonly used to establish connectivity as a backup.
As a security tester, how would you discover what telephone numbers to dial-in to the router?
What is the technique that Eve used in the case above?
Eve decides to get her hands dirty and tries out a Denial of Service attack that is relatively new to her. This time she envisages using a different kind of method to attack Brownies Inc. Eve tries to forge the packets and uses the broadcast address. She launches an attack similar to that of “fraggle”. What is the technique that Eve used in the case above?
When referring to the Domain Name Service, what is a 'zone'?
When referring to the Domain Name Service, what is a ‘zone’?
What should James use?
James is the lone IT technician for a small advertising agency in the Midwest. He oversees three servers and fifteen workstations all running Windows operating systems. James just got back from a Hacker Halted conference and is now very concerned about the security of his network. Previously he thought that no one would be interested in his small company’s data, but now he
thinks otherwise. His budget is very limited and he cannot afford any kind of commercial IDS or IPS system.
James is looking for a freeware or easy-to-use open source program that will help him to detect port scans on his workstations and servers.
What should James use?
What is the most common vehicle for social engineering attacks?
What is the most common vehicle for social engineering attacks?
Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the tr
SSL has been seen as the solution to a lot of common security problems. Administrator will often time make use of SSL to encrypt communications from points A to point B. Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?
What type of virus has Lyle found on this computer?
Lyle is a systems security analyst for Gusteffson & Sons, a large law firm in Beverly Hills. Lyle�s responsibilities include network vulnerability scans, Antivirus monitoring, and IDS monitoring. Lyle receives a help desk call from a user in the Accounting department. This user reports that his computer is running very slow all day long and it sometimes gives him an error message that the hard drive is almost full. Lyle runs a scan on the computer with the company antivirus software and finds nothing. Lyle downloads another free antivirus application and scans the computer again. This time a virus is found on the computer.The infected files appear to be Microsoft Office files since they are in the same directory as that software. Lyle does some research and finds that this virus disguises itself as a genuine application on a computer to hide from antivirus software. What type of virus has Lyle found on this computer?
What filter will you apply?
You have captured some packets in Ethereal. You want to view only packets sent from 10.0.0.22.
What filter will you apply?