Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You are a Web Administrator of Millennium Inc. The company has hosted its Web site within its network. The management wants the company's vendors to be able to connect to the corporate site from their locations through the Internet. As a public network is involved in this process, you are concerned about the security of data transmitted between the vendors and the corporate site.

Which of the following can help you?

A.

EAP

B.

WEP

C.

Smart card

D.

VPN

Which of the following statements are true about session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

A.

TCP session hijacking is when a hacker takes over a TCP session between two machines.

B.

It is the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.

C.

Use of a long random number or string as the session key reduces session hijacking.

D.

It is used to slow the working of victim's network resources.

Which of the following statements are true about session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

A.

It is used to slow the working of victim's network resources.

B.

TCP session hijacking is when a hacker takes over a TCP session between two machines.

C.

Use of a long random number or string as the session key reduces session hijacking.

D.

It is the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.

GSM uses either A5/1 or A5/2 stream cipher for ensuring over-the-air voice privacy. Which of the following cryptographic attacks can be used to break both ciphers?

A.

Man-in-the-middle attack

B.

Ciphertext only attack

C.

Known plaintext attack

D.

Replay attack

In which of the following attacking methods does an attacker distribute incorrect IP address?

A.

IP spoofing

B.

Mac flooding

C.

Man-in-the-middle

D.

DNS poisoning

Fill in the blank with the appropriate word.

____is a port scanner that can also be used for the OS detection.

Which of the following are the countermeasures against WEP cracking?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Using the longest key supported by hardware.

B.

Using a non-obvious key.

C.

Using a 16 bit SSID.

D.

Changing keys often.

Which of the following techniques are NOT used to perform active OS fingerprinting?

Each correct answer represents a complete solution. Choose all that apply.

A.

Analyzing email headers

B.

Sniffing and analyzing packets

C.

ICMP error message quoting

D.

Sending FIN packets to open ports on the remote system

Which of the following attacks allows an attacker to recover the key in an RC4 encrypted stream from a large number of messages in that stream?

A.

SYN flood attack

B.

Rainbow attack

C.

Zero Day attack

D.

FMS attack

When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?

A.

Closed

B.

Open

C.

Filtered