Question 1 5 points This tool can help detect arp spoofing Q
Question 1 (5 points)
This tool can help detect arp spoofing:
Question 1 options:
inverse arp
xarp
smac
rarp
Save
Question 2 (5 points)
A spoofing attack includes (choose all that apply):
Question 2 options:
pretends to be another user
relies on the legitimate user
uses stolen credentials
takes over of an HTTP session
Save
Question 3 (5 points)
When conducting a Sniffing Pen Testing we follow a certain order. Select the correct order from the list below.
Question 3 options:
Rogue Server, DHCP Starvation, Mac Spoofing, ARP Poisoning
MAC Spoofing, Rogue Server, ARP Poisoning, DHCP Starvation
DHCP Starvation, Rogue Server, ARP Poisoning, MAC Spoofing
DHCP Starvation, Rogue Server, MAC Spoofing, ARP Poisoning
Save
Question 4 (5 points)
This will help prevent DNS spoofing attacks (choose all that apply):
Question 4 options:
SSL
primary zones
SSH
secondary zones
Save
Question 5 (5 points)
The characteristics of these Trojans include the ability to open and close the CD-ROM tray (check all that apply):
Question 5 options:
Dark Comet
NetBus
Poison Ivy
SubSeven
Save
Question 6 (5 points)
How should you enable DHCP to enable DHCP snooping? (choose all that apply)
Question 6 options:
on a per protocol basis
per vlan
locally
globally
Save
Question 7 (5 points)
Your Supervisor is concerned about the use of port 139 in your environment. What measure do you recommend?
Question 7 options:
Use TCP Wrappers
Turn on the Windows Firewall
Block ICMP so the host cannot be detected
Disable File and Print Sharing
Save
Question 8 (5 points)
You can filter for an IP Address in Wireshark by typing:
Question 8 options:
IP.ADDR ==
IP ==
IP =
IP.Address ==
Save
Question 9 (5 points)
There are many purposes of malware, including which of the following? (choose all that apply)
Question 9 options:
Remove the Default LAN Route
Making a Computer Useless
Obtaining Passwords
Disable Networking Functions
Save
Question 10 (5 points)
Pick the types of Session Hijacking:
Question 10 options:
Passive
Kernel
Working
Active
Save
Question 11 (5 points)
With a session fixation attack, the attacker uses a:
Question 11 options:
valid SID
corrupt packet
cookie
legitmate packet
Save
Question 12 (5 points)
When going through the 3-way handshake put the following in sequence:
Question 12 options:
Syn seq, SYN+ACK, ACK
AYN+ACK, SYN Seq, ACO
ACK, SYN+ACK, ACK
SYN SEQ, ACK, FIN
Save
Question 13 (5 points)
What were the two dominant attack strategies identified in Symantec\'s Threat Report?
Question 13 options:
Distributed Denial of Service
Advanced Persistent Threats
Broader Strokes
Focused Attack
Save
Question 14 (5 points)
Which of the following are countermeasures that can be used for Trojans?
Question 14 options:
Install patches and security updates
Monitor all internal network traffic
Block unnecessary ports
Educate users to install applications from sites
Save
Question 15 (5 points)
In which type of session hijacking does a hacker sit back and watch traffic?
Question 15 options:
passive
stateless
active
stateful
Save
Question 16 (5 points)
This tool will allow you to spoof a MAC address:
Question 16 options:
inverse arp
rarp
xarp
smac
Save
Question 17 (5 points)
An attacker sees that Sara is on the internet every day. The attacker is able to infect Sara’s machine with a Trojan and change her DNS IP address. This is DNS spoofing.
Question 17 options:
Save
Question 18 (5 points)
This is an example of a Trojan that can be utilized for Website Defacement:
Question 18 options:
HTTrack
Restorator
WGET
CrimePack
Save
Question 19 (5 points)
Computers are able to be infected by viruses select how a computer is able to get an virus. Select all that apply.
Question 19 options:
Open infected e-mail attachments
Sends location of victims address
Not running the latest anti-virus application
Installing pirated software
Save
Question 20 (5 points)
A hijacking attack includes (choose all that apply):
Question 20 options:
relies on the legitimate user
pretends to be another user
takes over of an HTTP session
uses stolen credentials
| inverse arp | |
| xarp | |
| smac | |
| rarp | 
Solution
1 ) This tool can help detect arp spoofing:
answer is xarp.
in arp spoofing, the attacker sends false messages to users connected through the same LAN network. Hence, the attacker is now linked to your IP, and can now receive any data which you shall receive. Xarp is a firewall tool that can detect arp spoofing. It can detect hackers inside your network using active and passive modules.
______________________
2) A spoofing attack includes (choose all that apply)
answer - relies on the legimate user, uses stolen credentials, takes over an HTTP session.
As mentioned above that spoofing is about accessing someone\'s data through IP (taking over aHTTP session), using users connected on a LAN ( relieing on legitimate users ) using the actual users credentials.
-------------------------
When conducting a Sniffing Pen Testing we follow a certain order. Select the correct order from the list below.
answer - in the order -->> MAC Spoofing, Rogue Server, ARP Poisoning, DHCP Starvation
-------------------------------
This will help prevent DNS spoofing attacks (choose all that apply):
ansswer - SSL, secondary zone
DNS spoofing is the act of injecting false data into the cache of a DNS server causing it to serve this false data to its clients. Websites use valid SSL servers for this so tht hackers cannot clone the website and extract the data.
Stopping dynamic updates to all parties and instead giving it only to seleceted center DNS server can not be secured with primary zones.
------------------------
The characteristics of these Trojans include the ability to open and close the CD-ROM tray
answer :
subseven - with this trojan an attacker can turn the Caps Lock, Num Lock, and Scroll Lock off and on; disable the Ctl+Alt+Del key combination; log off the user; open and close the CD-ROM drive; turn the monitor off and on; invert the display; and shut down or reboot the computer. This uses ICQ, Internet Relay Chat (IRC), email, and even Common Gateway Interface (CGI) scripting to contact the originating intruder.
dark comet - this can hide the desktop, lock, task icons, sys tray icons, taskbar, start button, task manager, and open/close the CD tray.
netbus - can also open and close the cd rom tray.
--------------------------------------
How should you enable DHCP to enable DHCP snooping?
answer- DHCP snooping is enabled on a per-vlan basis. by default , however, it is not enabled on vlans and one must enable it manually. Also, one must enable DHCP snooping globally before we can use snooping in a vlan.
-------------------------------------
i have answered the first six, similarly try and solve the remaining.
thank you






