File extensions provide information regarding the underlying server technology. Attackers can use this
information to search vulnerabilities and launch attacks.
How would you disable file extensions in Apache servers?
Bob has a good understanding of cryptography, having worked with it for many years. Cryptography is used to
secure data from specific threats, but it does not secure the application from coding errors. It can provide data
privacy; integrity and enable strong authentication but it cannot mitigate programming errors.
What is a good example of a programming error that Bob can use to explain to the management how
encryption will not address all their security concerns?
One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime
numbers, which are used in the RSA PKI mathematical process. If the two numbers p and q are discovered
through a _____________ process, then the private key can be derived.
NetBIOS over TCP/IP allows files and/or printers to be shared over the network. You are trying to intercept the
traffic from a victim machine to a corporate network printer. You are attempting to hijack the printer network
connection from your laptop by sniffing the wire.
Which port does SMB over TCP/IP use?
One of the ways to map a targeted network for live hosts is by sending an ICMP ECHO request to the
broadcast or the network address. The request would be broadcasted to all hosts on the targeted network. The
live hosts will send an ICMP ECHO Reply to the attacker's source IP address.
You send a ping request to the broadcast address 192.168.5.255.
There are 40 computers up and running on the target network. Only 13 hosts send a reply while others do not.
Why?
Charlie is the network administrator for his company. Charlie just received a new Cisco router and wants to test
its capabilities out and to see if it might be susceptible to a DoS attack resulting in its locking up. The IP
address of the Cisco switch is 172.16.0.45.
What command can Charlie use to attempt this task?
Attackers send an ACK probe packet with random sequence number, no response means port is filtered
(stateful firewall is present) and RST response means the port is not filtered.
What type of Port Scanning is this?