You have an FTP service and an HTTP site on a single server. Which DNS record allows you to alias both services to the same record (IP address)?bogosrnatn
Blog
An attacker uses a Metasploit auxiliary exploit to send a se…
An attacker uses a Metasploit auxiliary exploit to send a series of small messages to a server at regular intervals. The server responds with 64Kb of data from its memory. Which of the following best describes the attack being used?
Which encryption standard is used by LM?
Which encryption standard is used by LM?
Which of the following is true regarding n-tier architecture…
Which of the following is true regarding n-tier architecture?
Which of the following best describes a teardrop attack?
Which of the following best describes a teardrop attack?
You are port scanning a system and begin sending TCP packets…
You are port scanning a system and begin sending TCP packets with the with the ACK flag set. Examining the return packets, you see a return packet for one port has RST flag set and the TTL is less than 64. Which of the following is true?
Which of the following best describes a honeypot?
Which of the following best describes a honeypot?
A pen test team member uses the following entry at the comma…
A pen test team member uses the following entry at the command line:nmap –script http-methods –script-args somesystem.comWhich of the following is true regarding the intent of the command?
An ethical hacker is ACK-scanning against a network segment…
An ethical hacker is ACK-scanning against a network segment he knows is sitting behind a stateful firewall. If a scan packet receives no response, what does that indicate?
Which of the following is the best choice for detecting wire…
Which of the following is the best choice for detecting wireless LANS using 802.1 la/b/g/n WLAN standards on a Linux platform?