Which of the following operator in Google search will you use to achieve this?
You are footprinting the www.xsecurity.com domain using the Google search engine. You would like to determine what sites link to www.xsecurity.com at the first level of relevance. Which of the following operator in Google search will you use to achieve this?
Identify the line in the source code that might lead to buffer overflow?
The programmers on your team are analyzing the free, open source software being used to run FTP services on a server in your organization. They notice that there is excessive number of functions in the source code that might lead to buffer overflow. These C++ functions do not check bounds. Identify the line in the source code that might lead to buffer overflow?
What is this law called?
The United Kingdom (UK) has passed a law that makes hacking into an unauthorized network a felony.
The law states:
Section 1 of the Act refers to unauthorized access to computer material. This states that a person commits an offence if he causes a computer to perform any function with intent to secure unauthorized access to any program or data held in any computer. For a successful conviction under this part of the Act, the prosecution must prove that the access secured is unauthorized and that the suspect knew that this was the case. This section is designed to deal with common-or- garden hacking.
Section 2 of the Act deals with unauthorized access with intent to commit or facilitate the commission of further offences. An offence is committed under Section 2 if a Section 1 offence has been committed and there is the intention of committing or facilitating a further offence (any offence which attracts a custodial sentence of more than five years, not necessarily one covered by the Act). Even if it is not possible to prove the intent to commit the further offence, the Section 1 offence is still committed.
Section 3 offences cover unauthorized modification of computer material, which generally means the creation and distribution of viruses. For a conviction to succeed there must have been the intent to cause the modification, and knowledge that the modification had not been authorized.
What is this law called?
What is the best way to undermine the social engineering activity of tailgating?
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating?
What can you infer from this observation?
While scanning a network you observe that all of the web servers in the DMZ are responding to ACK packets on port 80. What can you infer from this observation?
What are you most likely to infer from this?
Clive is conducting a pen-test and has just port scanned a system on the network. He has identified the operating system as Linux and been able to elicit responses from ports 23, 25 and 53. He infers port 23 as running Telnet service, port 25 as running SMTP service and port 53 as running DNS service. The client confirms these findings and attests to the current availability of the services. When he tries to telnet to port 23 or 25, he gets a blank screen in response. On typing other commands, he sees only blank spaces or underscores symbols on the screen. What are you most likely to infer from this?
How does a denial-of-service attack work?
How does a denial-of-service attack work?
Why was John not able to connect?
John is the network administrator for Frederickson Machinery in Tampa, Florida. Frederickson Machinery has one large office, and a number of smaller offices spread out around the city. John’s primary responsibility is to oversee the network equipment hat includes switches, routers, gateways and firewalls. John is the only employee allowed to make any changes or troubleshoot the network equipment so he has to run to any of the offices himself whenever there are any network issues. John is becoming more and more busy, so he wants to be able to remotely manage the network equipment as much as possible. He does not want to use telnet because of its inherent security flaws, so he decides to use SSH. John downloads a program from the Internet for SSH connections and attempts to connect to one of his routers at another office. After a short time, the following screen pops up on his computer:
Why was John not able to connect?
Which of the choices below are the proper features offered by Snort?
Snort is an open source Intrusion Detection System. However, it can also be used for a few other purposes such as a sniffer. Which of the choices below are the proper features offered by Snort?