Which of the following statements are true about NTLMv1?
Each correct answer represents a complete solution. Choose all that apply.
A. It uses the LANMAN hash of the user's password.
B. It is mostly used when no Active Directory domain exists.
C. It is a challenge-response authentication protocol.
D. It uses the MD5 hash of the user's password.
Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?
A. Stalking Amendment Act (1999)
B. Malicious Communications Act (1998)
C. Anti-Cyber-Stalking law (1999)
D. Stalking by Electronic Communications Act (2001)
Which of the following tools can be used to automate the MITM attack?
A. Hotspotter
B. Airjack
C. Kismet
D. IKECrack
You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring ISA Server 2006, which of the following is NOT necessary?
A. Configuration of VPN access
B. Setting up of monitoring on ISA Server
C. Defining ISA Server network configuration
D. Defining how ISA Server would cache Web contents
In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?
A. Insertion
B. Evasion
C. Fragmentation overwrite D. Fragmentation overlap
Which of the following is a web ripping tool?
A. Netcat
B. NetBus
C. SuperScan
D. Black Widow
Which of the following is a web ripping tool?
A. Netcat
B. NetBus
C. SuperScan
D. Black Widow
Which of the following is an open source Web scanner?
A. Nikto
B. GFI LANguird
C. NetRecon
D. Internet scanner
Which of the following statements about Fport is true?
A. It works as a process viewer.
B. It works as a datapipe on Windows.
C. It works as a datapipe on Linux.
D. It is a source port forwarder/redirector.
Which of the following event logs contains traces of brute force attempts performed by an attacker?
A. SysEvent.Evt
B. WinEvent.Evt
C. AppEvent.Evt
D. SecEvent.Evt