Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 41 An NMAP command that includes the host specification of 202.176.56-57. il scan umber of hosts. 512 256 Over 1000 65535 QUESTION 42 Attack

image text in transcribed

QUESTION 41 An NMAP command that includes the host specification of 202.176.56-57. il scan umber of hosts. 512 256 Over 1000 65535 QUESTION 42 Attack forges a TCP/IP packet, which causes the victim to try opening a connection with itself. This causes the system to go into an infinite loop trying to resolve this unexpected connection. Eventually, the connection times out but during this resolution, the machine appears to hang or become very slow. The attack sends such packets on a regular basis to slow down system. Unpatched Win Server machines are vulnerable to these attacks. What type of Denial of service attack is represented here? land attack ping of the death SYN flood attack Smurf attack QUESTION 43 Samuel is the network administrator of Data X communications Inc. He is trying to configure his firewall to block address for a period of 24 hours time after more than three unsuccessful attempts. He is confident that this rule will work to stop these attacks but it does not. he still receives hundreds of thousands of brute-force attempts generated from various IP addresses around the Internet. Samuel want to completely block hackers brute force attempts on his network. What are the alternatives to defending against possible brute-force password attacks on his site? Enforce complex password policy on your network You cannot completely block the intruders attempt if they switch proxy constantly It cannot happen, so no worry Enable IDS to monitor the intrusion attempts and alert you by email

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Access Patterns Database Interactions In Object Oriented Applications

Authors: Clifton Nock

1st Edition

0321555627, 978-0321555625

More Books

Students also viewed these Databases questions

Question

the merger of two similar pharmaceutical firms is an example of

Answered: 1 week ago

Question

* What is the importance of soil testing in civil engineering?

Answered: 1 week ago

Question

Explain the concept of shear force and bending moment in beams.

Answered: 1 week ago