Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.
Which of the following DoS attacks is Maria using to accomplish her task?
Which of the following are the centralized administration technologies?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.
Which of the following should propose applicable and effective security controls for managing the risks?
Which of the following defines the communication link between a Web server and Web applications?
Routers and firewalls use _______ to determine which packets should be forwarded or dropped.
Which of the following classes of fire comes under Class C fire?
Which of the following involves identifying and minimizing the effect of risks?
The backup system that stores only those files that have been changed since the last backup is known as ______.
You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following database types is a collection of tables that are linked by their primary keys?
Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?
Which of the following tools can be used to perform polymorphic shell code attacks?
Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?
Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?