PrepAway - Latest Free Exam Questions & Answers

Tag: 312-50

Which of the following comes as one of the last steps that should be taken to ensure that the compromise canno

An attacker has successfully compromised a remote computer. Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem?

What would be the name of this tool?

John is using a special tool on his Linux platform that has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI scripts. Moreover, the database detects DDoS zombies and Trojans as well. What would be the name of this tool?

What do the signature of attack for SYN Flood contains?

SYN Flood is a DOS attack in which an attacker deliberately violates the three-way handshake and opens a large number of half-open TCP connections. The signature of attack for SYN Flood contains:

What tool would be best used to have the LM hashes computed for all possible permutations of the administrator

Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense’s front end Exchange Server. He was able to get into the server, located in a DMZ, by using an unused service account that had a very weak password that he was able to guess. Johnny wants to crack the administrator password, but does not have a lot of time to crack it. He wants to use a tool that already has the LM hashes computed for all possible permutations of the administrator password.?

What tool would be best used to accomplish this?

How can an attacker disguise his buffer overflow attack signature such that there is a greater probability of

Basically, there are two approaches to network intrusion detection: signature detection, and anomaly detection. The signature detection approach utilizes well-known signatures for network traffic to identify potentially malicious traffic. The anomaly detection approach utilizes a previous history of network traffic to search for patterns that are abnormal, which would indicate an intrusion. How can an attacker disguise his buffer overflow attack signature such that there is a greater probability of his attack going undetected by the IDS?

Which of the following encryption is not based on block cipher?

Which of the following encryption is not based on block cipher?

How do you disable LM authentication in Windows XP?

LM authentication is not as strong as Windows NT authentication so you may want to disable its use, because an attacker eavesdropping on network traffic will attack the weaker protocol. A successful attack can compromise the user’s password. How do you disable LM authentication in Windows XP?

What should Richard use to utilize email encryption agency-wide?

Richard is a network administrator working at a student loan company in Iowa. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company, schools, and lenders is carried out through email. Because of privacy laws that are in the process of being implemented, Richard wants to get ahead of the game and become compliant before any sort of auditing occurs. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, Richard wants to utilize email encryption agency-wide. The only problem for Richard is that his department only has a couple of servers, and they are utilized to their full capacity. Since a server- based PKI is not an option for him, he is looking for a low/no cost solution to encrypt email.

What should Richard use?


Page 62 of 150« First...102030...6061626364...708090...Last »