PrepAway - Latest Free Exam Questions & Answers

Tag: Exam SCNP

Exam SCNP: SCNP Strategic Infrastructure Security

Take a look at the HTML code sample presented here and determine the line that presents the vulnerability:

Most companies that do business via the Web offer a shopping cart so you can specify all the
items you want before placing the order. Poor shopping cart design, however, can allow a different
kind of hack. Take a look at the HTML code sample presented here and determine the line that
presents the vulnerability:
<code>
<FORM ACTION=”http://10.0.10.236/cgi-bin/orders.pl” method=”post”>
<input type=hidden name=”price” value=”39.95″>
<input type=hidden name=”item_no” value=”WIDGET9″>
QUANTITY: <input type=text name=”quantity” size=2 maxlength=2 value=1>
</FORM>
</code>

What is the impact to the ISP when hit with a DDoS such as this?

After a year as a senior network administrator, you have been promoted to work in the security
department of a large global Tier One ISP. You are to spend one month in training on security
issues, concepts, and procedures. The third day in your new position, the ISP is hit with a DDoS
attack from over 100,000 computers on the Internet. While the department works to manage the
attack, you monitor the impact on the network. What is the impact to the ISP when hit with a DDoS
such as this?

identify the function of the program.

During a routine security inspection of the clients in your network, you find a program called
cgiscan.c on one of the computers. You investigate the file, reading part of the contents. Using the
portion of the program shown below, identify the function of the program.
<code>
Temp[1] = “GET /cgi-bin/phf HTTP/1.0\n\n”;
Temp[2] = “GET /cgi-bin/Count.cgi HTTP/1.0\n\n”;
Temp[3] = “GET /cgi-bin/test-cgi HTTP/1.0\n\n”;
Temp[4] = “GET /cgi-bin/php.cgi HTTP/1.0\n\n”;
Temp[5] = “GET /cgi-bin/handler HTTP/1.0\n\n”;
Temp[6] = “GET /cgi-bin/webgais HTTP/1.0\n\n”;
Temp[7] = “GET /cgi-bin/websendmail HTTP/1.0\n\n”;
</code>

which type of DNS Spoofing is this?

You work for a medium sized ISP and there have been several attacks of the DNS configuration
recently. You are particularly concerned with DNS Spoofing attacks. You have a few older
machines that define the storage of Resource Records (RR) based on the TTL of name mapping
information. If an attacker sends fake mapping information to the DNS Server, with a high TTL,
which type of DNS Spoofing is this?


Page 10 of 24« First...89101112...20...Last »