GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

GradePack

You are examining lDS logs and come across the following ent…

You are examining lDS logs and come across the following entry:Mar 30 10:31:07 (1123): IDS1661/NOPS-x86: 64.118.55.64:1146-> 192.168.119.56:53What can you infer from this log entry?

Read Details

You are examining lDS logs and come across the following ent…

You are examining lDS logs and come across the following entry:Mar 30 10:31:07 (1123): IDS1661/NOPS-x86: 64.118.55.64:1146-> 192.168.119.56:53What can you infer from this log entry?

Read Details

You’ve decided to begin scanning against a target organizati…

You’ve decided to begin scanning against a target organization but want to keep your efforts as quiet as possible. Which IDS evasion technique splits the TCP header among multiple packets?

Read Details

You are discussing wireless security with your client. She t…

You are discussing wireless security with your client. She tells you she feels safe with her network as she has implemented MAC filtering on all access points, allowing only MAC addresses from clients she personally configures in each list. You explain this step will not prevent a determined attacker from connecting to this network. Which of the following explains why the APs are still vulnerable?

Read Details

Which of the following is true regarding n-tier architecture…

Which of the following is true regarding n-tier architecture?

Read Details

Examining a database server during routine maintenance, you…

Examining a database server during routine maintenance, you discover an hour of time missing from the log file, during what would otherwise be normal operating hours. Further investigation reveals no user complaints on accessibility. Which of the following is the most likely explanation?

Read Details

A WPA2 wireless network is discovered during a pen test. Whi…

A WPA2 wireless network is discovered during a pen test. Which of the following methods is the best way to crack the network key?

Read Details

When an attack by a hacker is politically motivated, the hac…

When an attack by a hacker is politically motivated, the hacker is said to be participating in which of the following?

Read Details

Which of the following can migrate the machine’s actual oper…

Which of the following can migrate the machine’s actual operating system into a virtual machine?

Read Details

Which of the following are appropriate active sniffing techn…

Which of the following are appropriate active sniffing techniques against a switched network? (Choose all that apply)

Read Details

Posts pagination

Newer posts 1 … 37,346 37,347 37,348 37,349 37,350 … 74,401 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top