A network admin contacts you. He is concerned that ARP spoofing or poisoning might occur on his network. What are some things he can do to prevent it? Select the best answers.
Correct Answer:
ABD
Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?
Correct Answer:
D
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?
Correct Answer:
E
In the field of cryptanalysis, what is meant by a “rubber-hose” attack?
Correct Answer:
C
John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker Installed a scanner on a machine belonging to one of the vktims and scanned several machines on the same network to Identify vulnerabilities to perform further exploitation. What is the type of vulnerability assessment tool employed by John in the above scenario?
Correct Answer:
B
Knowing when to include agents into your vulnerability management processes isn’t an easy decision. Below are common use cases for agent-based vulnerability scanning to assist you build out your combined scanning strategy. Intermittent or Irregular Connectivity: Vulnerability management teams are now tasked with scanning devices that access the company network remotely using public or home-based Wi-Fi connections. These connections are often unreliable and intermittent leading to missed network-based scans. Fortunately, the scanning frequency of agents doesn’t require a network connection. The agent detects when the device is back online, sending scan data when it’s ready to communicate with the VM platform.
Connecting Non-Corporate Devices to Corporate Networks:With the increased use of private devices, company networks are more exposed to malware and infections thanks to limited IT and security teams’ control and visibility. Agent-based scanning gives security teams insight into weaknesses on
non-corporate endpoints, keeping them informed about professional hacker is potential attack vectors in
order that they can take appropriate action. Endpoints Residing Outside of Company Networks: Whether company-issued or BYOD, remote assets frequently hook up with the web outside of traditional network bounds. An agent that resides on remote endpoints conducts regular, authenticated scans checking out system changes and unpatched software. The results are then sent back to the VM platform and combined with other scan results for review, prioritization, and mitigation planning.
Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network.