Click link for more description
Question 1 (5 points)
By default, where are the IIS logs recorded?
Question 1 options:
Question 2 (5 points)
Which steps should be taken to increase web server security? (Select all that apply.)
Question 2 options:
Remove unused application mappings.
Enable remote administration.
Apply service packs and hotfixes.
Check for malicious input in forms and query strings.
Question 3 (5 points)
IP spoofing is not difficult and can be used in a variety of attacks. However, the attacker will not see the packets that are returned to the spoofed IP address. In this case, the attacker uses ______________ and then sniffs the traffic as it passes.
Question 3 options:
alternate data streams
Question 4 (5 points)
Which of the following is the best countermeasure against hijacking? (Select all that apply.)
Question 4 options:
Use unpredictable sequence numbers.
Do not use the TCP protocol.
Limit the unique sessions token to each browser’s instance.
Question 5 (5 points)
This IIS 7 component allows clients to publish, locks and manages resources on the web, and should be disabled on a dedicated server.
Question 5 options:
Active Server pages
Internet Data Connector
Question 6 (5 points)
Which of the following components help defend against session hijacking? (Select all that apply.)
Question 6 options:
per-packet integrity checking
Question 7 (5 points)
_____________ is the US government's repository of standards-based vulnerability-management data that includes databases of security checklists, security-related software flaws, misconfigurations, product names, and impact metrics.
Question 7 options:
National Vulnerability Database (NVD)
US Cyber Security Database
National SQL Database
US Vulnerability Database
Question 8 (5 points)
Which type of attack allows an attacker to change the DNS table of a server so that requests for sites redirect to an IP address of the attacker's choosing?
Question 8 options:
Unicode directory traversal vulnerability
Question 9 (5 points)
An attacker sends packets to a target host using a spoofed IP address of a trusted host on a different network. What kind of packets will be returned to the attacker?
Question 9 options:
ISNs incremented by 1
No packets will be returned to the attacker.
Question 10 (5 points)
What tool could an attacker use to capture sequence and acknowledgment numbers from a victim in order to track a network session?
Question 10 options: