Question 236

Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An
attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the
wired network to mitigate the attack. Which of the following attacks best describes the attacker's intentions?
  • Question 237

    SIMULATION
    Fill in the blank with the correct numeric value.
    ARP poisoning is achieved in ______ steps.

    Question 238

    Which of the following penetration testing phases involves gathering data from whois, DNS, and network scanning, which helps in mapping a target network and provides valuable information regarding the operating system and applications running on the systems?
  • Question 239

    Which of the following statements are true about tcp wrappers?
    Each correct answer represents a complete solution. Choose all that apply.
  • Question 240

    John works as a Network Administrator for We-are-secure Inc. He finds that TCP port 7597 of the Weare- secure server is open. He suspects that it may be open due to a Trojan installed on the server. He presents a report to the company describing the symptoms of the Trojan. A summary of the report is given below:
    Once this Trojan has been installed on the computer, it searches Notpad.exe, renames it Note.com, and then copies itself to the computer as Notepad.exe. Each time Notepad.exe is executed, the Trojan executes and calls the original Notepad to avoid being noticed.
    Which of the following Trojans has the symptoms as the one described above?