A security staff is preparing for a security audit and wants to know if additional security training for the end user would be beneficial. Which of the following methods would be the best option for testing the effectiveness of user training in the environment?
Blog
You have an FTP service and an HTTP site on a single server….
You have an FTP service and an HTTP site on a single server. Which DNS record allows you to alias both services to the same record (IP address)?bogosrnatn
An attacker uses a Metasploit auxiliary exploit to send a se…
An attacker uses a Metasploit auxiliary exploit to send a series of small messages to a server at regular intervals. The server responds with 64Kb of data from its memory. Which of the following best describes the attack being used?
Which encryption standard is used by LM?
Which encryption standard is used by LM?
Which of the following is true regarding n-tier architecture…
Which of the following is true regarding n-tier architecture?
Which of the following best describes a teardrop attack?
Which of the following best describes a teardrop attack?
You are port scanning a system and begin sending TCP packets…
You are port scanning a system and begin sending TCP packets with the with the ACK flag set. Examining the return packets, you see a return packet for one port has RST flag set and the TTL is less than 64. Which of the following is true?
Which of the following best describes a honeypot?
Which of the following best describes a honeypot?
A pen test team member uses the following entry at the comma…
A pen test team member uses the following entry at the command line:nmap –script http-methods –script-args somesystem.comWhich of the following is true regarding the intent of the command?
An ethical hacker is ACK-scanning against a network segment…
An ethical hacker is ACK-scanning against a network segment he knows is sitting behind a stateful firewall. If a scan packet receives no response, what does that indicate?