DNS query is sent to the DNS server to resolve www.google.com DNS server replies with the IP address for Googl
You establish a new Web browser connection to Google. Since a 3-way handshake is required for
any TCP connection, the following actions will take place.
DNS query is sent to the DNS server to resolve www.google.com
DNS server replies with the IP address for Google?
SYN packet is sent to Google.
Google sends back a SYN/ACK packet
Your computer completes the handshake by sending an ACK
The connection is established and the transfer of data commences
Which of the following packets represent completion of the 3-way handshake?
which you will NOT be able to accomplish with this probe?
Which of the following Trojans would be considered ‘Botnet Command Control Center’?
Which of the following Trojans would be considered ‘Botnet Command Control Center’?
What type of Virus is shown here?
What would be the name of this tool?
John is using a special tool on his Linux platform that has a database containing signatures to be
able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI/ASPX
scripts. Moreover, the database detects DDoS zombies and Trojans as well. What would be the
name of this tool?
What does this mean?
Fred is scanning his network to ensure it is as secure as possible. Fred sends a TCP probe packet
to a host with a FIN flag and he receives a RST/ACK response. What does this mean?
________ is a type of symmetric-key encryption algorithm that transforms a fixed-length block of plaintextR
_____________ is a type of symmetric-key encryption algorithm that transforms a fixed-length
block of plaintext (unencrypted text) data into a block of ciphertext (encrypted text) data of the
same length.
How would you accomplish this?
Your company has blocked all the ports via external firewall and only allows port 80/443 to
connect to the Internet. You want to use FTP to connect to some remote server on the Internet.
How would you accomplish this?
Which command will you run to disable auditing from the cmd?
You have successfully gained access to a victim’s computer using Windows 2003 Server SMB
Vulnerability. Which command will you run to disable auditing from the cmd?