Question 156

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the
network of the company from all possible entry points. He segmented the network into several subnets and installed
firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out
except the ports that must be used. He does need to have port 80 open since his company hosts a website that must
be accessed from the Internet. Adam is still worried about the programs like GIACing2 that can get into a network
through covert channels.
Which of the following is the most effective way to protect the network of the company from an attacker using
GIACing2 to scan his internal network?
  • Question 157

    Which of the following statements about Denial-of-Service (DoS) attack are true?
    Each correct answer represents a complete solution. Choose three.
  • Question 158

    John works as an Ethical Hacker for PassGuide Inc. He wants to find out the ports that are open in PassGuide's server using a port scanner. However, he does not want to establish a full TCP connection.
    Which of the following scanning techniques will he use to accomplish this task?
  • Question 159

    Which of the following would allow you to automatically close connections or restart a server or
    service when a DoS attack is detected?
  • Question 160

    John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows:
    C:\whisker.pl -h target_IP_address
    -- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = -
    = Host: target_IP_address
    = Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
    mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
    + 200 OK: HEAD /cgi-bin/printenv
    John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server.
    Which of the following statements about 'Printenv' vulnerability are true?
    Each correct answer represents a complete solution. Choose all that apply.