Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

GSEC 401.3 Internet Security Technology Exam Questions All Correctly Answered

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
26-04-2024
Written in
2023/2024

GSEC 401.3 Internet Security Technology Exam Questions All Correctly Answered Reconnaissance Tools - Answer -1) Who Is - DNS Servers 2) NSLookup - ip Address 3) ARIN - IP Address Range Scanning Tools - Answer -1) Hping2 - visable IP 2) NMap - Open Ports 3) Vulnerability Scanner - Services and exposures Exploitation Tools - Answer -1) Pivot points 2) internal recon 3) internal scanning 4) data exploits Creating backdoors - Answer -1) Create an unauthorized entry point in a system or network Covering Tracks - Answer -1) remove all traces of entries 2) erase and alter logs 3) remove backdoor Mitnick vs. Shimomura (Attack) - Answer -1) Confidentiality, integrity and availability attack 2) Reconnaissance probing to determine trust relationship ("R utilities") 3) IP Spoofing to act as one side of trust relationship 4) Lack of site or secure network design 5) Minimal configuration management Detection and Prevention Technique questions - Answer -1) What common techniques (prevention and detection) coul have prevented the attack? 2) What risk management techniques could have detected the attack? **** Ensure you FIX the Problem and NOT address the Symptoms **** Patching Systems - Answer -1) Fix know Vulnerabilities 2) Apply patch in timely manner 3) Reduce attack surface Hardening the System - Answer -1) Disable unused systems 2) Network vulnerability scans 3) Host-Based IDS 4) Network Intrusion Detection 5) Firewalls Malicious Code Types - Answer -1) Logic Bombs 2) Trojan Horse 3) Trap Door Malicious Code: Logic Bombs - Answer -1) Most commonly inserted by a trusted insider Malicious Code: Trojan Horses - Answer -1) Any program that has an unintended purpose Malicious Code: Trap Doors - Answer -1) Inserted for "maintenance" purposes, Sendmail and DNS have both of these Remote Maintenance - Answer -1) Allows adminstrators and vendors into a system, to troubleshoot a problem remotely Denial of Service - Answer -1) Resource exhaustion DOS: (SMURF, SYN Flood) Very difficult to defend against. Overwhelms resources on system 2) Take advantage of vulnerabilities in a system Brute Force - Answer -1) Bombarding a system with guess to gain access Browsing - Answer -1) Simplest attack 2) Open source search to reveal sensitive information 3) Social Media is a great tool for browsing Race Conditions - Answer -1) Timing is everything 2) TOC/TOU (Time of check/time of use) 2a) TOC/TOU Attack: Exploiting the difference in between when a security control is applied and the time of service was used 3) TOC/TOU should equal zero Alteration of Code - Answer -1) Attack against the integrity of a system, program and data RootKit - Answer -1) Hides the back doors and root access to a system 2) Subvert kernel, process management, file access, security and memory management funcgtions Types of RootKits - Answer -1) NARK 2) ADORE 3) KISS

Show more Read less
Institution
GSEC 401.3 Internet Security Technology
Course
GSEC 401.3 Internet Security Technology









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
GSEC 401.3 Internet Security Technology
Course
GSEC 401.3 Internet Security Technology

Document information

Uploaded on
April 26, 2024
Number of pages
11
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • gsec 4013
$12.89
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Stuviaascorers University of Washington
View profile
Follow You need to be logged in order to follow users or courses
Sold
363
Member since
2 year
Number of followers
185
Documents
10716
Last sold
1 week ago
StuviaAscorers | Top Study Notes & Exam Solutions

Stuviaascorers – Your #1 Source for Top-Quality Study Materials! Struggling with exams? Stuviaascorers has got you covered! I provide expertly crafted study notes, summaries, past papers, and exam-ready answers to help you pass with flying colors. My materials are designed for clarity, accuracy, and success—so you can study smarter, not harder! Why Choose My Study Materials? Well-structured & easy to understand – No fluff, just what you need! Exam-focused & high-scoring content – Get straight to the point! Accurate answers & clear explanations – Learn with confidence! Save time & boost your grades – Study efficiently! Don’t leave your success to chance! Browse my documents and start acing your exams today!

Read more Read less
3.8

64 reviews

5
30
4
11
3
11
2
2
1
10

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions