- (Topic 3)
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-aresecure server. Which of the following are countermeasures against a brute force attack?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
BD
- (Topic 2)
You want to find out what ports a system is listening on. What Is the correct command on a Linux system?
Correct Answer:
A
Reference:
http://cbl.abuseat.org/advanced.html
- (Topic 3)
Which of the following are the drawbacks of the NTLM Web authentication scheme?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
AB
- (Topic 4)
Which of the following is NOT a Back orifice plug-in?
Correct Answer:
D
- (Topic 2)
You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?
Correct Answer:
C