An attacker uses a Metasploit auxiliary exploit to send a series of small messages to a server at regular intervals. The server responds with 64Kb of data from its memory. Which of the following best describes the attack being used?
Blog
Which encryption standard is used by LM?
Which encryption standard is used by LM?
Which of the following is true regarding n-tier architecture…
Which of the following is true regarding n-tier architecture?
Which of the following best describes a teardrop attack?
Which of the following best describes a teardrop attack?
You are port scanning a system and begin sending TCP packets…
You are port scanning a system and begin sending TCP packets with the with the ACK flag set. Examining the return packets, you see a return packet for one port has RST flag set and the TTL is less than 64. Which of the following is true?
Which of the following best describes a honeypot?
Which of the following best describes a honeypot?
A pen test team member uses the following entry at the comma…
A pen test team member uses the following entry at the command line:nmap –script http-methods –script-args somesystem.comWhich of the following is true regarding the intent of the command?
An ethical hacker is ACK-scanning against a network segment…
An ethical hacker is ACK-scanning against a network segment he knows is sitting behind a stateful firewall. If a scan packet receives no response, what does that indicate?
Which of the following is the best choice for detecting wire…
Which of the following is the best choice for detecting wireless LANS using 802.1 la/b/g/n WLAN standards on a Linux platform?
Enacted in 2002, this U.S. law requires every federal agency…
Enacted in 2002, this U.S. law requires every federal agency to implement information security programs, including significant reporting on compliance and accreditation. Which of the following is the best choice for this definition?