You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using hping2 utility. This attack is known as __________.
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement?
Each correct answer represents a complete solution. Choose two.
Fill in the blank with the appropriate act name.
The___ act gives consumers the right to ask emailers to stop spamming them.
You want to use a Windows-based GUI tool which can perform MITM attacks, along with sniffing and ARP poisoning. Which of the following tools will you use?
Which of the following is the frequency range to tune IEEE 802.11a network?
Which of the following is the most common method for an attacker to spoof email?
You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:
SELECT email, passwd, login_id, full_name
FROM members
WHERE email = 'attacker@somehwere.com'; DROP TABLE members; --'
What task will the above SQL query perform?
What difference would you expect to result from running the following commands;
(I). S dig ©ns domain.com target.com -t AXFR
and
(2). S dig ©ns.domain.com target.com -t IXFR=1002200301
Which of the following standards is used in wireless local area networks (WLANs)?
Which of the following event logs contains traces of brute force attempts performed by an attacker?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |