Which of the following actions can you NOT perform from the Windows Firewall control panel? (choose all that apply) (C) Create firewall exceptions based on port numbers 6. Which of the following policy modifications would make it harder for intrudes to penetrate user passwords by a brute force attack? (choose all that apply) (A) Increase the value of the Reset Account Login Counter after Policy 7. Connection security rules requires that network traffic allowed through the
To begin with, the definition of a port scan is, “The examination of TCP and UDP ports to determine which are open and what services are running. (Conklin 659) “The method used by intruders to discover the services running on the target machine. The intruder can then plan an attack on any vulnerable service that he or she finds for example, if the intruder finds that port 143 is open here she may proceed to find out what version of IMAP is running on the target machine if the version is vulnerable she may be able to gain superuser access to the machine using exploit (a program that exploits a security hole).” (Teo, 2000) To put the definition of the port scan into simpler terms it is a way for intruders to scan the network of the company for a way into the company records and programs. A port scan can tell an intruder what port is open, where it leads to, and what programs, files, passwords are on the machine that they have found access. Ping sweeps are used to identify the path a host ID uses in a given subnet.
True or False? * True 27. To identify the NetBIOS names of systems on the 193.145.85.0 network, which of the following commands do you use? * a. nbtscan 193.145.85.0/24 28. Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network?
Your account framework can be: Choose the 2 that apply. Category: B. The login account has domain administrator privileges A. The intended GP user has been set up in SQL prior to the installation C. The ODBC connection to the SQL server is set up D. You have logged onto the workstation with local administrator privileges Answer: D Question No: 19 What should you confirm before beginning the Microsoft Dynamic GP installation on a workstation? Category: Page 6 of 17 Copyrights © 2007 Selftest Engine, all rights Reserved.
Increase fault tolerance by splitting DHCP scopes. 2. Balance the load on your DHCP server by using the 80/20 rule for scopes 3. Allow remote administration of DHCP servers by comfiguring windows Firewall ports. | Question 4 | What is the name of the computer you are working from?
Unit 2 – Assignment 1: Selecting Security Countermeasures Marcial Norori IS3220 Mr. Sebastian Burci ITT Technical Institute – Hialeah, FL. 1/5/2015 A secure Web server provides a protected foundation for hosting Web applications. A Web server configuration plays a critical role in the Web application's security. Badly configured directories can lead to unauthorized access. A forgotten detail can provide a convenient back door, while an overlooked port can be an attacker's front door.
An attacker can access the Web server. running on your domain server computer. and run the sample programs. 9. An attacker is able to launch a denial of service (DoS) attack from a single computer that has attacked you before.
Table for Individual Question FeedbackPoints Earned:1.0/1.0Correct Answer(s):C 3. __________ is the process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or certificate. Table for Individual Question FeedbackPoints Earned:0.0/1.0Correct Answer(s):Authentication 4. SMTP server is essentially the Windows counterpart to the __________ program used by most UNIX Web servers. Table for Individual Question FeedbackPoints Earned:0.0/1.0Correct Answer(s):sendmail; Sendmail 5.
• Imagine you are a CISO of a publically traded company and concerned about security when sending any message traffic over the Internet to your remote sites. Determine the security measures you would consider implementing to mitigate security risks when sending message traffic over the Internet. Explain your reasoning. Teardrop – a mangled packet sent in fragments via overlapping or overloading payloads which could cause the systems as it has in the past with older OS versions. Sequence number – hijacked or interrupted TCP/IP sessions via injected packets that disguises its origination from one of the two computers in a session.
6. (TCO 3) What type of RAM do most motherboards use today? RIMM Rambus SAMM DIMM 7. (TCO 3) To help secure a computer, you can set a startup or “power-on” password so that the startup BIOS will ask for the password during the boot process. This password is stored in _______.