QUESTION 41 An NMAP command hat ncludes the host specifcation of 2021 7660.57.\"
ID: 3726048 • Letter: Q
Question
QUESTION 41 An NMAP command hat ncludes the host specifcation of 2021 7660.57." wil scan·number of hosts. ) 256 Over 1000 65635 QUESTION 42 sow Ta attack sends such packeon a naguar basis to sloaw downssm UnpalchedWin Sarvar machis ane uabe to thesa atads Whet type of Denial of service sTack is represented her8? ping ot death Smufatlack QUESTION 43 housmos of brute force attempts gener ied from varpaslP addresses round tie Internet Samel w What are the matas to dtanding against pessible ute-torce password atacks onhs sta? nt bo rmp tety biock heckers brute fro-attempts on hTB network Enorce compe password pecy on your retwork It cannot happan, so no warry Enale IDS to monto he irtrusion stempts and aert ycu by emailExplanation / Answer
Question 41:
Answer: 512
NMAP stands for Network Mapper. It scans the number of ports on a machine and it also scans the number of hosts on a network. The hosts with IP address 202.176.56-57.* will scan 512 hosts.
202.176.56.0-255 = 256 hosts
202.176.57.0-255 = 256 hosts
= 256+256 = 512 hosts.
Question 42:
Answer: Land Attack
Land Attack is a Denial of service attack which will send the packet with a forged header. A vulnerable machine would receive the packet and reply to the destination address effectively sending the packet for reprocessing in an infinite loop. This makes the vulnerable system become very slow or it may even crash. The main idea of this attack is to slow down the system.
Question 43:
Answer: You cannot completely block the intruders if they switch proxies.
Intruders can use multiple machines to brute force the password. proxy is a computer server that acts as an intermediate between the end-user and the other server the user is requesting a service. So if the intruders use proxies, it is not possible to block all the intruders who are trying to brute-force the password of his site. so even if he tries to enforce new password policies, the password attacks cant be defended as the intruders use proxies.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.