what are some of the things you would recommend to a company to ensure DNS security?
As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security?
Select the best answers.
What sequence of packets is sent during the initial TCP three-way handshake?
What sequence of packets is sent during the initial TCP three-way handshake?
Which TCP and UDP ports must you filter to check null sessions on your network?
Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system. Which TCP and UDP ports must you filter to check null sessions on your network?
What port number is used by LDAP protocol?
What port number is used by LDAP protocol?
What does FIN in TCP flag define?
What does FIN in TCP flag define?
Which of the following represents the initial two commands that an IRC client sends to join an IRC network?
Which of the following represents the initial two commands that an IRC client sends to join an IRC network?
What is Eve trying to do?
Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate
Alice machine. From the command prompt, she types the following command.
For /f "tokens=1 %%a in (hackfile.txt) do net use * \10.1.2.3c$ /user:"Administrator" %%a
What is Eve trying to do?
What would you call this attack?
Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two.
What would you call this attack?
What kind of attack is Susan carrying on?
Susan has attached to her company’s network. She has managed to synchronize her boss’s sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. What kind of attack is Susan carrying on?
Which definition among those given below best describes a covert channel?
Which definition among those given below best describes a covert channel?