A digital signature is simply a message that is encrypted with the public key instead of the private key.
A digital signature is simply a message that is encrypted with the public key instead of the private
key.
What file would you find the information in and where?
You are a Administrator of Windows server. You want to find the port number for POP3. What file
would you find the information in and where?
Select the best answer.
What can he infer from this kind of response?
Blane is a network security analyst for his company. From an outside IP, Blane performs an XMAS
scan using Nmap. Almost every port scanned does not illicit a response. What can he infer from
this kind of response?
which of the following are true statements that you would point out?
One of your junior administrator is concerned with Windows LM hashes and password cracking. In
your discussion with them, which of the following are true statements that you would point out?
Select the best answers.
what is the decimal value for XMAS scan?
In TCP communications there are 8 flags; FIN, SYN, RST, PSH, ACK, URG, ECE, CWR. These
flags have decimal numbers assigned to them:
FIN = 1
SYN = 2
RST = 4
PSH = 8
ACK = 16
URG = 32
ECE = 64
CWR =128
Example: To calculate SYN/ACK flag decimal value, add 2 (which is the decimal value of the SYN
flag) to 16 (which is the decimal value of the ACK flag), so the result would be 18.
Based on the above calculation, what is the decimal value for XMAS scan?
which of these is the "exploit"?
In the following example, which of these is the “exploit”?
Today, Microsoft Corporation released a security notice. It detailed how a person could bring down
the Windows 2003 Server operating system, by sending malformed packets to it. They detailed
how this malicious process had been automated using basic scripting. Even worse, the new
automated method for bringing down the server has already been used to perform denial of
service attacks on many large commercial websites.
Select the best answer.
what does it indicate?
A simple compiler technique used by programmers is to add a terminator ‘canary word’ containing
four letters NULL (0x00), CR (0x0d), LF (0x0a) and EOF (0xff) so that most string operations are
terminated. If the canary word has been altered when the function returns, and the program
responds by emitting an intruder alert into syslog, and then halts what does it indicate?
what type of general attack could compromise the data?
Assuring two systems that are using IPSec to protect traffic over the internet, what type of general
attack could compromise the data?
what can an attacker do?
What is a Trojan Horse?
What is a Trojan Horse?