Question 296

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
  • Question 297

    You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.
    What wireshark filter will show the connections from the snort machine to kiwi syslog machine?
  • Question 298

    In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?
  • Question 299

    Which of the following is a low-tech way of gaining unauthorized access to systems?
  • Question 300

    Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in Evil
    Corp's lobby. He checks his current SID, which is S-1-5-21-1223352397-1872883824-861252104-501.
    What needs to happen before Matthew has full administrator access?