Question 56

Which of the following is the BEST way to defend against network sniffing?
  • Question 57

    Harris is attempting to identify the OS running on his target machine. He inspected the initial TTL in the IP header and the related TCP window size and obtained the following results:
    TTL: 64 Window Size: 5840
    What is the OS running on the target machine?
  • Question 58

    After an audit, the auditors Inform you that there is a critical finding that you must tackle Immediately. You read the audit report, and the problem is the service running on port 389. Which service Is this and how can you tackle the problem?
  • Question 59

    Ricardo has discovered the username for an application in his targets environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application, what type of attack is Ricardo performing?
  • Question 60

    Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?