An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network’s external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?
Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP enquires over the network.
Which of these tools would do the SNMP enumeration he is looking for? Select the best answers.
The “Gray-box testing” methodology enforces what kind of restriction?
Which of the following tools can be used to perform a zone transfer?
Which DNS resource record can indicate how long any "DNS poisoning" could last?
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
Which method of password cracking takes the most time and effort?
Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system. Which TCP and UDP ports must you filter to check null sessions on your network?
Which definition among those given below best describes a covert channel?
The collection of potentially actionable, overt, and publicly available information is known as
You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. What Wireshark filter will show the connections from the snort machine to kiwi syslog machine?
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.
A camera captures people walking and identifies the individuals using Steve’s approach.
After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:
Which of the following programs is usually targeted at Microsoft Office products?
Which of the following is not a Bluetooth attack?
Under what conditions does a secondary name server request a zone transfer from a primary name server?