LM authentication is not as strong as Windows NT authentication so you may want to disable its use, because an attacker eavesdropping on network traffic will attack the weaker protocol. A successful attack can compromise the user's password. How do you disable LM authentication in Windows XP?
Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B. How do you prevent DNS spoofing? (Select the Best Answer.)
What is the algorithm used by LM for Windows2000 SAM?
What is a Trojan Horse?
Exhibit:
Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?
What is the goal of a Denial of Service Attack?
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?
A file integrity program such as Tripwire protects against Trojan horse attacks by:
What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?(Choose all that apply.
Which of the following LM hashes represent a password of less than 8 characters? (Select 2)
Ethereal works best on ____________.
_____ is the process of converting something from one representation to the simplest form. It deals with the way in which systems convert data from one form to another.
In the following example, which of these is the "exploit"?
Today, Microsoft Corporation released a security notice. It detailed how a person could bring down the Windows 2003 Server operating system, by sending malformed packets to it. They detailed how this malicious process had been automated using basic scripting. Even worse, the new automated method for bringing down the server has already been used to perform denial of service attacks on many large commercial websites.
Select the best answer.
Which of the following display filters will you enable in Ethereal to view the three-way handshake for a connection from host 192.168.0.1?
Susan has attached to her company’s network. She has managed to synchronize her boss’s sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. What kind of attack is Susan carrying on?
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
In Linux, the three most common commands that hackers usually attempt to Trojan are:
You are a Administrator of Windows server. You want to find the port number for POP3. What file would you find the information in and where?
Select the best answer.
What hacking attack is challenge/response authentication used to prevent?
A POP3 client contacts the POP3 server: