Question 51

Which of the following topologies is a type of physical network design where each computer in the network is connected to a central device through an unshielded twisted-pair (UTP) wire?
  • Question 52

    The IR team and the network administrator have successfully handled a malware incident on the network. The team is now preparing countermeasure guideline to avoid a future occurrence of the malware incident.
    Which of the following countermeasure(s) should be added to deal with future malware incidents? (Select all that apply)
  • Question 53

    Identify the password cracking attempt involving precomputed hash values stored as plaintext and used to crack the password.
  • Question 54

    John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.
    Original cookie values:
    ItemID1=2
    ItemPrice1=900
    ItemID2=1
    ItemPrice2=200
    Modified cookie values:
    ItemID1=2
    ItemPrice1=1
    ItemID2=1
    ItemPrice2=1
    Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price. Which of the following hacking techniques is John performing?
  • Question 55

    If Myron, head of network defense at Cyberdyne, wants to change the default password policy settings on the company's Linux systems, which directory should he access?