how best you can achieve this objective?
While examining audit logs, you discover that people are able to telnet into the SMTP server on
port 25. You would like to block this, though you do not see any evidence of an attack or other
wrong doing. However, you are concerned about affecting the normal functionality of the email
server. From the following options choose how best you can achieve this objective?
Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Serve
Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured
on Web Servers.
Which of the following are known weaknesses of LM?
Windows LAN Manager (LM) hashes are known to be weak. Which of the following are known
weaknesses of LM? (Choose three)
Which port does SMB over TCP/IP use?
NetBIOS over TCP/IP allows files and/or printers to be shared over the network. You are trying to
intercept the traffic from a victim machine to a corporate network printer. You are attempting to
hijack the printer network connection from your laptop by sniffing the wire. Which port does SMB
over TCP/IP use?
what would be the fastest type of password cracking attack you can run against these hash values and still get
You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social
engineering, you come to know that they are enforcing strong passwords. You understand that all
users are required to use passwords that are at least 8 characters in length. All passwords must
also use 3 of the 4 following categories: lower case letters, capital letters, numbers and special
characters.
With your existing knowledge of users, likely user account names and the possibility that they will
choose the easiest passwords possible, what would be the fastest type of password cracking
attack you can run against these hash values and still get results?
Why Only 13 hosts send a reply while others do not?
One of the ways to map a targeted network for live hosts is by sending an ICMP ECHO request to
the broadcast or the network address. The request would be broadcasted to all hosts on the
targeted network. The live hosts will send an ICMP ECHO Reply to the attacker’s source IP
address.
You send a ping request to the broadcast address 192.168.5.255.
There are 40 computers up and running on the target network. Only 13 hosts send a reply while
others do not. Why?
What command can Charlie use to attempt this task?
Charlie is the network administrator for his company. Charlie just received a new Cisco router and
wants to test its capabilities out and to see if it might be susceptible to a DoS attack resulting in its
locking up. The IP address of the Cisco switch is 172.16.0.45. What command can Charlie use to
attempt this task?
How would the attacker use netcat to encrypt the information before transmitting onto the wire?
An attacker runs netcat tool to transfer a secret file between two hosts.
Machine A: netcat -l -p 1234 < secretfile
Machine B: netcat 192.168.3.4 > 1234
He is worried about information being sniffed on the network. How would the attacker use netcat to
encrypt the information before transmitting onto the wire?
What type of encryption does WPA2 use?
What type of encryption does WPA2 use?
What is GINA?
What is GINA?