- (Topic 5)
Which system consists of a publicly available set of databases that contain domain name registration contact information?
Correct Answer:A
- (Topic 5)
An NMAP scan of a server shows port 69 is open. What risk could this pose?
Correct Answer:A
- (Topic 3)
Which tool would be used to collect wireless packet data?
Correct Answer:A
- (Topic 5)
What are the three types of compliance that the Open Source Security Testing Methodology Manual (OSSTMM) recognizes?
Correct Answer:D
- (Topic 8)
What is Hunt used for?
Correct Answer:D
Hunt can be used to intercept traffic. It is useful with telnet, ftp, and others to grab traffic between two computers or to hijack sessions.
- (Topic 3)
After a client sends a connection request (SYN) packet to the server, the server will respond (SYN-ACK) with a sequence number of its choosing, which then must be acknowledged (ACK) by the client. This sequence number is predictable; the attack connects to a service first with its own IP address, records the sequence number chosen, and then opens a second connection from a forged IP address. The attack doesn't see the SYN-ACK (or any other packet) from the server, but can guess the correct responses. If the source IP address is used for authentication, then the attacker can use the one-sided communication to break into the server. What attacks can you successfully launch against a server using the above technique?
Correct Answer:B