What is the function of this file?
You have recently installed an Apache Web server on a SuSe Linux machine. When you return
from lunch, you find that a colleague has made a few configuration changes. One thing you notice
is a .htpasswd file. What is the function of this file?
What is happening to your Email server?
Recently you found out that there has been a flood of bogus network traffic hitting your Email
server.
Because of this flood, authorized users have not been able to consistently send or receive email.
What is happening to your Email server?
What can you do to minimize the threat that this specific type of email presents?
You are concerned that email messages sent to your Outlook clients could contain customized
and dangerous scripting. What can you do to minimize the threat that this specific type of email
presents?
What are the four Zones that are available in Internet Explorer 7.0?
You are conducting a security awareness session for some of the employees in your organization.
The discussion moves to the use if the web browser, which is Internet Explorer 7.0 for all
employees. What are the four Zones that are available in Internet Explorer 7.0?
What is the function of the HFNetChk tool, available with MBSA?
Microsoft has developed several security tools to help you with the security and configuration of
the systems in your network. One of these tools is the Microsoft Security Baseline Analyzer
(MBSA). In the command line options of the MBSA is the HFNetChk tool. What is the function of
the HFNetChk tool, available with MBSA?
Which of the following would you not perform to harden this system?
You just installed a new SuSe Linux web server, running Apache, and are in the process of
hardening the server. The server will perform basic web services, static web pages to internal
clients only. Which of the following would you not perform to harden this system?
How many DNS servers would have to be compromised to have complete control of the Internet DNS?
One of the major benefits to the design of the Internet is the redundancy that is built-in. To provide
a measure of fault tolerance for DNS on the Internet, the designers of the Domain Name System
distributed the root servers in various countries around the world. If an attacker were to attempt to
disable DNS, they would have to gain administrative access on all the root servers. How many
DNS servers would have to be compromised to have complete control of the Internet DNS?
Which of the following do Buffer Overflows exploit?
You are studying the current attack methods and find that one of your servers is vulnerable to a
Buffer
Overflow attack. Which of the following do Buffer Overflows exploit?
Which of the following is the name of the Active X authentication system Microsoft has included to prevent Act
Which of the following is the name of the Active X authentication system Microsoft has included to
prevent Active X controls from being altered or corrupted by attackers wanting to perform
unwarranted operations?
which type of DNS Spoofing?
You work for a medium sized ISP and there have been several attacks of the DNS configuration
recently.
You are particularly concerned with DNS Spoofing attacks. If an attacker is able to send out false
data to a
DNS client before the response from the DNS server arrives, this is which type of DNS Spoofing?