An HIDS is used to monitor potential or suspected intrusions on a system or host
unlike an NIDS it cannot be used to monitor traffic or activity on a network.
it looks for changes to files,
misuse,
privilege abuse,
alterations to log files,
and other activities depending on the vendor.
Tuesday, 23 July 2019
LOIC is used for?
The Low Orbit Ion Cannon(LOIC)
is used to perform DoS or DDoS attacks against a victim system.
is used to perform DoS or DDoS attacks against a victim system.
what is the problem with SMTP about security?
the protocol is unencrypted
provides no protection against sniffing or hijacking
the protocol can be protected
if used with a VPN or similar technology.
provides no protection against sniffing or hijacking
the protocol can be protected
if used with a VPN or similar technology.
802.11 standards covers security relating to WPA2?
802.11i is the standard concerned
with the design and implementation of WPA2.
with the design and implementation of WPA2.
open and closed ports on a system?
Port scanners
Nmap and SuperScan
can determine the status of ports on a system or groups of systems.
Nmap and SuperScan
can determine the status of ports on a system or groups of systems.
white-box test?
extensive or full information is given to an evaluating party
to test the internal workings of an environment for audit purposes.
to test the internal workings of an environment for audit purposes.
which port is used by SSL?
Port 443 by convention
to be used by the SSL and TLS protocols
when combined with HTTP.
to be used by the SSL and TLS protocols
when combined with HTTP.
Subscribe to:
Comments (Atom)