Question 296
An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
Question 297
You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine.
What wireshark filter will show the connections from the snort machine to kiwi syslog machine?
What wireshark filter will show the connections from the snort machine to kiwi syslog machine?
Question 298
In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?
Question 299
Which of the following is a low-tech way of gaining unauthorized access to systems?
Question 300
Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in Evil
Corp's lobby. He checks his current SID, which is S-1-5-21-1223352397-1872883824-861252104-501.
What needs to happen before Matthew has full administrator access?
Corp's lobby. He checks his current SID, which is S-1-5-21-1223352397-1872883824-861252104-501.
What needs to happen before Matthew has full administrator access?
