PrepAway - Latest Free Exam Questions & Answers

Tag: Cisco ASA

If you receive a RST packet while doing an ACK scan, it indicates that the port is open.(True/False).

If you receive a RST packet while doing an ACK scan, it indicates that the port is open.(True/False).

What would you do next to fingerprint the OS?

While attempting to discover the remote operating system on the target computer, you receive the following results from an nmap scan:
Starting nmap V. 3.10ALPHA9 ( www.insecure.org/nmap/ )
Interesting ports on 172.121.12.222:
(The 1592 ports scanned but not shown below are in state: filtered) PortStateService
21/tcpopenftp
25/tcpopensmtp
53/tcpcloseddomain
80/tcpopenhttp
443/tcpopenhttp
Remote operating system guess: Too many signatures match to reliably guess the OS.
Nmap run completed — 1 IP address (1 host up) scanned in 277.483 seconds
What would you do next to fingerprint the OS?

How would you prevent session hijacking attacks?

How would you prevent session hijacking attacks?

Which of the following tools allows an attacker to intentionally craft packets to confuse pattern-matching NID

Most NIDS systems operate in layer 2 of the OSI model. These systems feed raw traffic into a detection engine and rely on the pattern matching and/or statistical analysis to determine what is malicious. Packets are not processed by the host’s TCP/IP stack allowing the NIDS to analyze traffic the host would otherwise discard. Which of the following tools allows an attacker to intentionally craft packets to confuse pattern-matching NIDS systems, while still being correctly assembled by the host TCP/IP stack to render the attack payload?