John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?
According to the scenario, John is performing the Steganography technique for sending malicious data. Steganography is an art and science of
hiding information by embedding harmful messages within other seemingly harmless messages. It works by replacing bits of unused data,
such as graphics, sound, text, and HTML, with bits of invisible information in regular computer files. This hidden information can be in the form
of plain text, cipher text, or even in the form of images.
Answer A is incorrect. Web ripping is a technique in which the attacker copies the whole structure of a Web site to the local disk and
obtains all files of the Web site. Web ripping helps an attacker to trace the loopholes of the Web site.
Answer D is incorrect. Social engineering is the art of convincing people and making them disclose useful information such as account
names and passwords. This information is further exploited by hackers to gain access to a user's computer or network. This method involves
mental ability of the people to trick someone rather than their technical skills. A user should always distrust people who ask him for his
account name or password, computer name, IP address, employee ID, or other information that can be misused.
Answer C is incorrect. John is not performing email spoofing. In email spoofing, an attacker sends emails after writing another person's
mailing address in the from field of the email id.
Which of the following are the countermeasures against WEP cracking?
Each correct answer represents a part of the solution. Choose all that apply.
A user can use some countermeasures to prevent WEP cracking. Although WEP is least secure, it should not be used. However, a user can
use the following methods to mitigate WEP cracking:
Use a non-obvious key.
Use the longest key supported by hardware.
Change keys often.
Use WEP in combination with other security features, such as rapid WEP key rotation and dynamic keying using 802.1x.
Consider WEP a deterrent, not a guarantee.
Answer D is incorrect. SSID stands for Service Set Identifier. It is used to identify a wireless network. SSIDs are case sensitive text
strings and have a maximum length of 32 characters. All wireless devices on a wireless network must have the same SSID in order to
communicate with each other.
The SSID on computers and the devices in WLAN can be set manually and automatically. Configuring the same SSID as that of the other
Wireless Access Points (WAPs) of other networks will create a conflict.
A network administrator often uses a public SSID that is set on the access point. The access point broadcasts SSID to all wireless devices
within its range. Some newer wireless access points have the ability to disable the automatic SSID broadcast feature in order to improve
network security.
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest
network. The functional level of the forest is Windows Server 2003. The company has recently provided fifty laptops to its sales team
members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data
placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data
interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another.
Which of the following actions will you take to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
In order to enable wireless networking, you have to install access points in various areas of your office building. These access points generate
omni directional signals to broadcast network traffic. Unauthorized users can intercept these packets. Hence, security is the major concern for
a wireless network. The two primary threats are unauthorized access and data interception. In order to accomplish the task, you will have to
take the following steps:
Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only. This will
prevent the sales team members from communicating directly to one another.
Implement the IEEE 802.1X authentication for the wireless network. This will allow only authenticated users to access the network data
and resources.
Configure the wireless network to use WEP encryption for data transmitted over a wireless network. This will encrypt the network data
packets transmitted over wireless connections. Although WEP encryption does not prevent intruders from capturing the packets, it
prevents them from reading the data inside.
Fill in the blank with the appropriate term.
When two routers are used in a firewall configuration, the internal router is known as a .
Correct
interior router present in the screened host firewall architecture. It is attached to the perimeter network and protects the internal network
from the Internet and the perimeter net.
A choke router is basically employed for the job of packet filtering for the firewall. It is also used to provide access to selected services that
are outbound from the internal net to the Internet. These services may include outgoing Telnet, FTP, WAIS, Archie, Gopher, etc.
Sam works as a Network Administrator for Blue Well Inc. All client computers in the company run the Windows Vista operating. Sam creates a new user account. He wants to create a temporary password for the new user such that the user is forced to change his password when he logs on for the first time. Which of the following options will he choose to accomplish the task?
Enabling the user must change password at next logon option will make the given password a temporary password. Enabling this option
forces a user to change his existing password at next logon.
Answer B is incorrect. There is no such option in Windows Vista.
Answer D is incorrect. This option sets the password to never expire.
Answer A is incorrect. This option sets the existing password as a permanent password for the user. Only administrators can change
the password of the user.
Pamella
13 days agoAllene
20 days agoTijuana
27 days agoAlida
1 month agoClemencia
1 month agoStefania
2 months agoTiera
2 months agoSueann
2 months agoRosendo
2 months agoLaurene
3 months agoKanisha
3 months agoVanesa
3 months agoFletcher
3 months agoTish
4 months agoGlenna
4 months agoGearldine
4 months agoJutta
4 months agoKendra
5 months agoIrene
5 months agoTresa
5 months agoMarget
5 months agoCassie
6 months agoGerman
6 months agoTalia
6 months agoTess
6 months agoMarvel
7 months agoDaron
7 months agoBen
7 months agoHershel
7 months agoEmilio
9 months agoJoseph
10 months agoMargery
10 months agoSommer
12 months agoNakita
1 year agoShayne
1 year agoTran
1 year agoEarnestine
1 year agoSon
1 year agoTien
1 year agoBettina
1 year agoPearlie
1 year agoAlpha
1 year agoShaquana
1 year agoBilly
1 year agoChun
1 year agoKaran
1 year agoLuann
1 year agoIra
1 year agoFlorinda
1 year agoShalon
1 year agoGeorgiana
1 year agoShizue
1 year agoYun
1 year agoWilletta
2 years agoShaun
2 years agoRoselle
2 years agoTyra
2 years agoJanessa
2 years agoAlonso
2 years agoWilliam
2 years agoDeonna
2 years agoSalena
2 years agoElvera
2 years agoMaryann
2 years ago