_________ is a set of extensions to DNS that provide to…
_________ is a set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS
data to reduce the threat of DNS poisoning, spoofing, and similar attacks types.
What did the hacker accomplish?
An attacker tries to do banner grabbing on a remote web server and executes the following command.
$ nmap -sV host.domain.com -p 80
He gets the following output.
Starting Nmap 6.47 ( http://nmap.org ) at 2014-12-08 19:10 EST
Nmap scan report for host.domain.com (108.61.158.211)
Host is up (0.032s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd
Service detection performed. Please report any incorrect results at http://nmap.org/submit/.Nmap done: 1 IP address (1 host up) scanned in 6.42 seconds
What did the hacker accomplish?
Which tier in the N-tier application architecture is re…
Which tier in the N-tier application architecture is responsible for moving and processing data between the
tiers?
What type of test is he conducting?
Seth is starting a penetration test from inside the network. He hasn’t been given any information about the
network. What type of test is he conducting?
What is the way to decide how a packet will move from a…
What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is
behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass
through the packet-filtering of the firewall.
What is she trying to achieve?
Eve stole a file named secret.txt, transferred it to her computer and she just entered these commands:
[eve@localhost ~]$ john secret.txt
Loaded 2 password hashes with no different salts (LM [DES 128/128 SSE2-16])
Press ‘q’ or Ctrl-C to abort. almost any other key for status
0g 0:00:00:03 3/3 0g/s 86168p/s 86168c/s 172336C/s MERO..SAMPLUI
0g 0:00:00:04 3/3 0g/s 3296Kp/s 3296Kc/s 6592KC/s GOS..KARIS4
0g 0:00:00:07 3/3 0g/s 8154Kp/s 8154Kc/s 16309KC/s NY180K..NY1837
0g 0:00:00:10 3/3 0g/s 7958Kp/s 7958Kc/s 1591KC/s SHAGRN..SHENY9
What is she trying to achieve?
How can he use it?
A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can
he use it?
What of the following options can be useful to ensure t…
The company ABC recently contracted a new accountant. The accountant will be working with the financial
statements. Those financial statements need to be approved by the CFO and then they will be sent to the
accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was
not modified once he approved it. What of the following options can be useful to ensure the integrity of the
data?
What is the name of the technique used by the opposition?
The company ABC recently discovered that their new product was released by the opposition before their
premiere. They contract an investigator who discovered that the maid threw away papers with confidential
information about the new product and the opposition found it in the garbage. What is the name of the
technique used by the opposition?
What is the role of test automation in security testing?
What is the role of test automation in security testing?