Vulnerability is the weakness of the
software, and the exploit is the attack, and exploit attack take advantage of a
compromised controlled system.
1. What are the four phases in the
social engineering attack cycle?
The
four phases of the attack cycle in social engineering attack are Gathering
information, Built rapport and relationship, exploitation, and Accomplishment.
2. List five subtypes of DoS attacks?
The
five sybtypes of the DoS attacks are referred to as Distributed DoS,
Distributed reflection DoS, permanent DoS, Amplified DoS, friendly DoS.
3. What type of scanning might identify
that talent is running on a server?
Port
scanning is the type of scanning in which digitization can be done
systematically to check the security policies and the attacks to find the
talent running or server.
4. A neighbor hacks into your securd
wireless network on regular basis, but you didn’t give him the password. What
loophole was most likely left open?
Make
the most intricate password for your router, save only limited password to
avoid forgetness,change your paswoed after every month, change the name and
administration of router.
5. Which form of SHA was developed by
private designers?
The
cryptography algorithm was developed by the private designers for the
protection of unspecified sensitive information, andFIPS-PUB 108-1 is also
later on designed by the individual designers.
6. Give an example of a tool to check
MD5 or SHA-2 checksum of a file. Please provide an example screenshot.
To
check the checksum file, for example: MD5, to download the file, just use your
own checksum calculator to produce the checksum using the same MD5 cryptography
can be used.
7. Which windows tool checks the
critical system file, and drivers have valid digital signatures?
To
verify the system in windows, click on the start button+R together, then
running will appear on your screen type the sigverif.exe in the box and then
press ok.
8. Which of the following ACL commands
would permit web-browsing traffic for any IP address to any IP address?
During the
configuration the router converts the numeric values in to the user-friendly
values. The access-list ACL-2 permit and access-list ACL-2 permit http would be
permitted for traffic web browsing.
10.which of the features is common to both an NGWF and traditional
firewalls?
User authentication
is the most common feature for both NGWF and traditional firewalls.
11. What software might be installed on a
device in order to authenticate it to the network?
Operating
system is a useful software that helps to control the computer system or for
the devices of the computer.
12. Active Directory and 389 Directory
server are both compatible with which directory access protocol?
LDAP
is the most compatible directory protocol which provides the interaction
between the directory service and network operating system, and it is widely
used in the access protocol.
13. What are the two primary features
that give proxy servers advantages over NAT?
The
proxy server is more useful than that of NAT because the proxy server can store
the desired data in the system.
14. Is whats the essential difference
between an IPS and an IDS?
The
main difference between IPS and IDS, IDS is the detecting and monitoring tool,
whereas IPS is a control system that accepts and rejects the rulesets on the
packet base.
15. Why do network administrators creat
domain groups to manage user security privileges?
The administrator
creat domain groups because the privileges enhance the complexity of the
tooling, and directly mechanisms fail or make the defense unsuccessful.