Question 6

Which of the following attacks are examples of Denial-of-service attacks (DoS)?
Each correct answer represents a complete solution. Choose all that apply.
  • Question 7

    You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The company has three Windows 2008 file servers, 150 Windows XP Professional, thirty UNIX-based client computers. The network users have identical user accounts for both Active Directory and the UNIX realm. You want to ensure that the UNIX clients on the network can access the file servers. You also want to ensure that the users are able to access all resources by logging on only once, and that no additional software is installed on the UNIX clients. What will you do to accomplish this task?
    Each correct answer represents a part of the solution. Choose two.
  • Question 8

    Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of Umbrella Inc.
    Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer.
    After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting.
    for (( i = 0;i<11;i++ )); do dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda done Which of the following actions does Adam want to perform by the above command?
  • Question 9

    John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows:
    C:\whisker.pl -h target_IP_address
    -- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - = = Host: target_IP_address
    = Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
    mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
    + 200 OK: HEAD /cgi-bin/printenv
    John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?
    Each correct answer represents a complete solution. Choose all that apply.
  • Question 10

    Which of the following tools are used as a network traffic monitoring tool in the Linux operating system?
    Each correct answer represents a complete solution. Choose all that apply.