Question 201

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing.
Recently, your company has assigned you a project to test the security of the we-aresecure.com Web site. For this, you want to perform the idle scan so that you can get the ports open in the we-are-secure.com server. You are using Hping tool to perform the idle scan by using a zombie computer. While scanning, you notice that every IPID is being incremented on every query, regardless whether the ports are open or close. Sometimes, IPID is being incremented by more than one value.
What may be the reason?
  • Question 202

    Which of the following functions can you use to mitigate a command injection attack?
    Each correct answer represents a part of the solution. Choose all that apply.
  • Question 203

    Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com.
    She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the
    ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request
    traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.
    Which of the following DoS attacks is Maria using to accomplish her task?
  • Question 204

    Which of the following is spy software that records activity on Macintosh systems via snapshots, keystrokes, and Web site logging?
  • Question 205

    Which of the following tools are used as a network traffic monitoring tool in the Linux operating system?
    Each correct answer represents a complete solution. Choose all that apply.