What is GINA?
What is GINA?
Fingerprinting an Operating System helps a cracker because:
Fingerprinting an Operating System helps a cracker because:
what is a ‘null’ user?
In the context of Windows Security, what is a ‘null’ user?
What does the following command in netcat do?
What does the following command in netcat do?
nc -l -u -p55555 < /etc/passwd
What hacking attack is challenge/response authentication used to prevent?
What hacking attack is challenge/response authentication used to prevent?
What file system vulnerability does the following command take advantage of?
What file system vulnerability does the following command take advantage of?
type c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe
Which of the following is NOT a means that can be used to minimize or protect against such an attack?
Attackers can potentially intercept and modify unsigned SMB packets, modify the traffic and
forward it so that the server might perform undesirable actions. Alternatively, the attacker could
pose as the server or client after a legitimate authentication and gain unauthorized access to data.
Which of the following is NOT a means that can be used to minimize or protect against such an
attack?
How do you disable LM authentication in Windows XP?
LM authentication is not as strong as Windows NT authentication so you may want to disable its
use, because an attacker eavesdropping on network traffic will attack the weaker protocol. A
successful attack can compromise the user’s password. How do you disable LM authentication in
Windows XP?
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
It deals with the way in which systems convert data from one form to another.
_____ is the process of converting something from one representation to the simplest form. It
deals with the way in which systems convert data from one form to another.