Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Requirements to be able to successfull y carry out a remote brute-force attack o

ID: 3866270 • Letter: R

Question

Requirements to be able to successfully carry out a remote brute-force attack on a system: (circle all that apply)

Question 12 options:

hosts access controls (hosts.allow/hosts.deny) are not being used on the system

some server running on the system must use password authentication

DNS zone transfers must be allowed from the system's authoritative DNS server

no firewall rate-limits connections into the system

a vulnerability has been discovered for server software running on the system

there is unpatched server software running on the system

ICMP echo (ping) responses must be allowed for the system

the system's filesystems must not be encrypted

no firewall limits IP connections into the system

some user(s) must have weak passwords on the system

A)

hosts access controls (hosts.allow/hosts.deny) are not being used on the system

B)

some server running on the system must use password authentication

C)

DNS zone transfers must be allowed from the system's authoritative DNS server

D)

no firewall rate-limits connections into the system

E)

a vulnerability has been discovered for server software running on the system

F)

there is unpatched server software running on the system

G)

ICMP echo (ping) responses must be allowed for the system

H)

the system's filesystems must not be encrypted

I)

no firewall limits IP connections into the system

J)

some user(s) must have weak passwords on the system

Explanation / Answer

Requirements to be able to successfully carry out a remote brute-force attack on a system:

D) no firewall rate-limits connections into the system

E) a vulnerability has been discovered for server software running on the system

F) there is unpatched server software running on the system

G) ICMP echo (ping) responses must be allowed for the system

H) the system's filesystems must not be encrypted

I) no firewall limits IP connections into the system

J) some user(s) must have weak passwords on the system

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote