Question 3 options Tape the USB ports Provide Users without Administrative

Question 3 options tape the usb ports provide users

This preview shows page 24 - 30 out of 50 pages.

What is the best course of action to remove Autorun for Removable Disks and CD Drives in Windows? Question 3 options: Tape the USB ports Provide Users without Administrative Rights Remove the CD-ROM Drive from the System Use Group Policy Question 4 (1 point) Question 4 Saved This tool will allow you to spoof a MAC address:
Image of page 24
Question 4 options: inverse arp rarp xarp smac Question 5 (1 point) Question 5 Unsaved What were the two dominant attack strategies identified in Symantec's Threat Report? Question 5 options: Advanced Persistent Threats Distributed Denial of Service Broader Strokes Focused Attack Question 8 (1 point) Question 8 Unsaved You can filter for an IP Address in Wireshark by typing: Question 8 options: IP.ADDR == IP.Address == IP == IP = Question 1 (5 points) Question 1 Unsaved This DOS tool works from a mobile platform Question 1 options: AnDOSid
Image of page 25
LOIC HULK DOSSIM Question 2 (5 points) Question 2 Unsaved Which of the following are true when referring to the term phalshing? (choose all that apply) Question 2 options: Something that can cause a device to render hardware inoperable An email attack in which the user is enticed to click on links A type of permanent Denial of Service Can be known as bricking Question 3 (5 points) Question 3 Unsaved Tor's hammer will run behind the TOR network. Question 3 options: True False Question 4 (5 points) Question 4 Unsaved Which of the following are password cracking techniques? (choose all that apply) Question 4 options: Brute Force Attacks Guessing Dictionary Attacks Hybrid Attack Question 5 (5 points) Question 5 Unsaved BlackShades Net can best be described as a: Question 5 options:
Image of page 26
Bot Wrapper RAT DDoS Tool Question 6 (5 points) Question 6 UnsavedDDoS Sim features include which of the following? (choose all that apply)Question 6 options:zombies simulationApplication Layer attacksTCP Based Attacksrandom source IP AddressQuestion 7 (5 points) Question 7 UnsavedTor's hammer will kill Apache 2X with less than:Question 7 options:128 threads16 threads64 threads256 threadsQuestion 8 (5 points) Question 8 UnsavedPassword cracking tools include (choose all that apply):Question 8 options:CainBrutusWiresharkHydra
Image of page 27
According to your text, most of the webservers run which of the following? Question 9 options: Apache Google NGINX Microsoft IIS Question 10 (5 points) Question 10 Unsaved Central Source propagation commonly utilized which of the following protocols? (choose all that apply) Question 10 options: FTP RDP TFTP RPC Question 11 (5 points) Question 11 Unsaved To crash a webserver, what should an attacker target? (Select all that apply) Question 11 options: Network Bandwidth Server Memory Database CPU Question 12 (5 points) Question 12 Unsaved What are the 3 techniques that can be utilized to propagate malicious code? Question 12 options: Central Source Back Dating
Image of page 28
Back Chaining Autonomous Question 13 (5 points) Question 13 Unsaved The two types of honeypots include: Question 13 options: IPS high interaction low interaction IDS Question 14 (5 points) Question 14 Unsaved SYN flooding takes advantage of which of the following? (choose all that apply) Question 14 options: A flaw in some firewalls which do not restrict ICMP traffic by default Not replying to SYN/ACKs
Image of page 29
Image of page 30

You've reached the end of your free preview.

Want to read all 50 pages?

  • Summer '15
  • Final Test, IP address, Transmission Control Protocol

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes