What is the appropriate next step?
A computer technician is using a new version of a word processing software package when it
is discovered that a special sequence of characters causes the entire computer to crash. The
technician researches the bug and discovers that no one else experienced the problem. What is
the appropriate next step?
What is Cygwin?
What is Cygwin?
What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a ho
What is the most secure way to mitigate the theft of corporate information from a laptop that was
left in a hotel room?
What would you call such a host?
Ron has configured his network to provide strong perimeter security. As part of his network
architecture, he has included a host that is fully exposed to attack. The system is on the public
side of the demilitarized zone, unprotected by a firewall or filtering router. What would you call
such a host?
What should the security team do to determine which alerts to check first?
The intrusion detection system at a software development company suddenly generates multiple
alerts regarding attacks against the company’s external webserver, VPN concentrator, and DNS
servers. What should the security team do to determine which alerts to check first?
what is the attacker ultimately trying to achieve as inferred from the log sequence?
After studying the following log entries, what is the attacker ultimately trying to achieve as inferred
from the log sequence?
1. mkdir -p /etc/X11/applnk/Internet/.etc
2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd
3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd
4. touch -acmr /etc /etc/X11/applnk/Internet/.etc
5. passwd nobody -d
6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash
7. passwd dns -d
8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd
9. touch -acmr /etc/X11/applnk/Internet/.etc /etc
Which technique could be used to obtain login credentials?
A corporation hired an ethical hacker to test if it is possible to obtain users’ login credentials using
methods other than social engineering. Access to offices and to a network node is granted.
Results from server scanning indicate all are adequately patched and physical access is denied,
thus, administrators have access only through Remote Desktop. Which technique could be used
to obtain login credentials?
What are you most likely to infer from this?
Clive is conducting a pen-test and has just port scanned a system on the network. He has
identified the operating system as Linux and been able to elicit responses from ports 23, 25 and
53. He infers port 23 as running Telnet service, port 25 as running SMTP service and port 53 as
running DNS service. The client confirms these findings and attests to the current availability of the
services. When he tries to telnet to port 23 or 25, he gets a blank screen in response. On typing
other commands, he sees only blank spaces or underscores symbols on the screen. What are you
most likely to infer from this?
Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows
Which of the following scanning tools is specifically designed to find potential exploits in Microsoft
Windows products?
How is it possible to list processes and uids associated with them in a more reliable manner?
On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned.
How is it possible to list processes and uids associated with them in a more reliable manner?