How many DNS servers would have to be compromised to have complete control of the Internet DNS?
One of the major benefits to the design of the Internet is the redundancy that is built-in. To provide
a measure of fault tolerance for DNS on the Internet, the designers of the Domain Name System
distributed the root servers in various countries around the world. If an attacker were to attempt to
disable DNS, they would have to gain administrative access on all the root servers. How many
DNS servers would have to be compromised to have complete control of the Internet DNS?
Which of the following do Buffer Overflows exploit?
You are studying the current attack methods and find that one of your servers is vulnerable to a
Buffer
Overflow attack. Which of the following do Buffer Overflows exploit?
which type of DNS Spoofing?
You work for a medium sized ISP and there have been several attacks of the DNS configuration
recently.
You are particularly concerned with DNS Spoofing attacks. If an attacker is able to send out false
data to a
DNS client before the response from the DNS server arrives, this is which type of DNS Spoofing?
Which of the following is the name of the Active X authentication system Microsoft has included to prevent Act
Which of the following is the name of the Active X authentication system Microsoft has included to
prevent Active X controls from being altered or corrupted by attackers wanting to perform
unwarranted operations?
which type of DNS Attack?
You work for a medium sized ISP and there have been several attacks of the DNS configuration
recently.
You are particularly concerned with DNS Spoofing and other DNS attacks. If an attacker is able to
take advantage of a BIND vulnerability to gain root access, this is which type of DNS Attack?
which option will you select to achieve this goal?
In your organization, the majority of employees use Microsoft Outlook Express as their email
client. You are configuring these systems so that applications on the employee systems cannot
send email, posing as the user of the system. Under the Security tab, which option will you select
to achieve this goal?
which of the following systems was implemented to increase the security of the DNS servers for the Internet?
The Root-Level DNS servers have come under many attacks over the years. Due to attacks, such
as the DDoS attack on the Root-Level DNS servers in October of 2002, which of the following
systems was implemented to increase the security of the DNS servers for the Internet?
Which one of the following is not a major component of the Internet?
You have been hired to work in the security division of a global Tier One ISP. You have been
given a staff of 25 people all new to network security. You wish to bring them all up to speed on
the components of the Internet and how they interact. Which one of the following is not a major
component of the Internet?
Take a look at the HTML code sample presented here and determine the line that presents the vulnerability̷
Most companies that do business via the Web offer a shopping cart so you can specify all the
items you want before placing the order. Poor shopping cart design, however, can allow a different
kind of hack. Take a look at the HTML code sample presented here and determine the line that
presents the vulnerability:
<FORM ACTION=”http://10.0.10.236/cgi-bin/orders.pl” method=”post”>
<input type=hidden name=”price” value=”39.95″>
<input type=hidden name=”item_no” value=”WIDGET9″>
QUANTITY: <input type=text name=”quantity” size=2 maxlength=2 value=1>
</FORM>
What is the function of the Tier System in the physical structure of the Internet?
You are discussing the design and infrastructure of the Internet with several colleagues when a
disagreement begins over the actual function of the Tier System in the Internets design. What is
the function of the Tier System in the physical structure of the Internet?