B. Output the results in truncated format to the screen
C. Perform an Xmas scan
D. Output the results in XML format to a file - D. Output the results in XML format to a file
Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux
server occurring during non-business hours. After further
examination of all login activities, it is noticed that none of the logins have occurred during typical work
hours. A Linux administrator who is investigating this
problem realizes the system time on the Linux server is wrong by more than twelve hours. What
protocol used on Linux servers to synchronize the time has
stopped working?
A. Time Keeper
B. NTP
C. PPP
D. OSPP - B. NTP
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems,
he uses a detection method where the anti-virus executes
the malicious codes on a virtual machine to simulate CPU and memory activities.
Which type of virus detection method did Chandler use in this context?
A. Heuristic Analysis
B. Code Emulation
C. Integrity checking
, D. Scanning - B. Code Emulation
If an attacker uses the command SELECT*FROM user WHERE name = 'x' AND userid IS NULL; --'; which
type of SQL injection attack is the attacker
performing?
A. End of Line Comment
B. UNION SQL Injection
C. Illegal/Logically Incorrect Query
D. Tautology - D. Tautology
Which of the following is considered as one of the most reliable forms of TCP scanning?
A. TCP Connect/Full Open Scan
B. Half-open Scan
C. NULL Scan
D. Xmas Scan - A. TCP Connect/Full Open Scan
Which of the following scanning method splits the TCP header into several packets and makes it difficult
for packet filters to detect the purpose of the packet?
A. ICMP Echo scanning
B. SYN/FIN scanning using IP fragments
C. ACK flag probe scanning
D. IPID scanning - B. SYN/FIN scanning using IP fragments
Which of the following attacks exploits web age vulnerabilities that allow an attacker to force an
unsuspecting user's browser to send malicious requests they did not intend?
A. Command Injection Attacks
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller oneclass. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.48. You're not tied to anything after your purchase.