What do you call a system where users need to remember only one username and password, and be authenticated fo
What do you call a system where users need to remember only one username and password,
and be authenticated for multiple services?
What could be the most likely cause?
Clive has been monitoring his IDS and sees that there are a huge number of ICMP Echo Reply
packets that are being received on the external gateway interface. Further inspection reveals that
they are not responses from the internal hosts’ requests but simply responses coming from the
Internet.
What could be the most likely cause?
What would best be defined as a security test on services against a known vulnerability database using an auto
What would best be defined as a security test on services against a known vulnerability database
using an automated tool?
A Buffer Overflow attack involves:
A Buffer Overflow attack involves:
what is the RID of the true administrator account?
When working with Windows systems, what is the RID of the true administrator account?
what is the correct response?
If you send a SYN to an open port, what is the correct response?(Choose all correct answers.
what is the RID of the true administrator account?
When working with Windows systems, what is the RID of the true administrator account?
What do you think was the most likely cause behind this sudden increase in traffic?
You have been called to investigate a sudden increase in network traffic at XYZ. It seems that the
traffic generated was too heavy that normal business functions could no longer be rendered to
external employees and clients. After a quick investigation, you find that the computer has
services running attached to TFN2k and Trinoo software. What do you think was the most likely
cause behind this sudden increase in traffic?
What type of attack is Henry using?
Henry is an attacker and wants to gain control of a system and use it to flood a target system with
requests, so as to prevent legitimate users from gaining access. What type of attack is Henry
using?
What is the technique that Eve used in the case above?
Eve decides to get her hands dirty and tries out a Denial of Service attack that is relatively new to
her. This time she envisages using a different kind of method to attack Brownies Inc. Eve tries to
forge the packets and uses the broadcast address. She launches an attack similar to that of
fraggle. What is the technique that Eve used in the case above?