"mountd access";)
Study the snort rule given below and interpret the rule.
alert tcp any any –> 192.168.1.0/24 111 (content:”|00 01 86 a5|”; msG. “mountd access”;)
cell(?(c)????
Erik notices a big increase in UDP packets sent to port 1026 and 1027 occasionally. He enters the
following at the command prompt.
$ nc -l -p 1026 -u -v
In response, he sees the following message.
cell(?(c)????STOPALERT77STOP! WINDOWS REQUIRES IMMEDIATE ATTENTION.
Windows has found 47 Critical Errors.
To fix the errors please do the following:
1. Download Registry Repair from: www.reg-patch.com
2. Install Registry Repair
3. Run Registry Repair
4. Reboot your computer
FAILURE TO ACT NOW MAY LEAD TO DATA LOSS AND CORRUPTION!
What would you infer from this alert?
What port number is used by LDAP protocol?
What port number is used by LDAP protocol?
What does the command in the exhibit do in “Ettercap”?
Exhibit:
ettercap –NCLzs –quiet
What does the command in the exhibit do in “Ettercap”?
How can Fred accomplish this?
Fred is the network administrator for his company. Fred is testing an internal switch. From an
external IP address, Fred wants to try and trick this switch into thinking it already has established a
session with his computer. How can Fred accomplish this?
Which responses would NOT be preferred by an experienced Security Manager?
A remote user tries to login to a secure network using Telnet, but accidently types in an invalid
user name or password. Which responses would NOT be preferred by an experienced Security
Manager? (multiple answer)
which of the following statements describes Social Engineering best?
Within the context of Computer Security, which of the following statements describes Social
Engineering best?
A POP3 client contacts the POP3 server:
A POP3 client contacts the POP3 server:
what is a covert channel?
Which of the following techniques can she use to gather information from the switched network or to disable so
Samantha was hired to perform an internal security test of XYZ. She quickly realized that all
networks are making use of switches instead of traditional hubs. This greatly limits her ability to
gather information through network sniffing.
Which of the following techniques can she use to gather information from the switched network or
to disable some of the traffic isolation features of the switch? (Choose two)