6.2 Enumeration Countermeasures

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is the most basic way to counteract SMTP exploitations? -Restrict zones to ensure where zones are copied, use digital signatures, and split zones. -Monitor ports, remove agents, update systems, and change default passwords. -Review and implement the security settings and services available with your server software. -Ignore messages to unknown recipients instead of sending back error messages.

Ignore messages to unknown recipients instead of sending back error messages.

After the enumeration stage, you are considering blocking port 389. Your colleague has advised you to use caution when blocking ports that could potentially impact your network. Which of the following necessary services could be blocked? -SMTP -DNS -LDAP -SNMP

LDAP

Robby, a security specialist, is taking countermeasures for SNMP. Which of the following utilities would he most likely use to detect SNMP devices on the network that are vulnerable to attacks? -Colasoft -Scany -Currport -SNscan

SNscan

Hugh, a security consultant, recommended the use of an internal and external DNS to provide an extra layer of security. Which of the following DNS countermeasures is being used? -DNS zone transfer -Digital signatures -Split DNS -DNS zone restriction

Split DNS

Diana, a penetration tester, executed the following command. Which answer describes what you learn from the information displayed? -This is a DNS zone transfer. -Split DNS is being used. -DNS translation is being used. -There are DNS restrictions in place.

This is a DNS zone transfer.


Set pelajaran terkait

Ch 16. Socioemotional Development in Late Adulthood

View Set

Biomechanics: Vectors & Kinematics

View Set

Statistics Module 5: Chapter 9-10

View Set

100 Books Everyone Should Read (in no particular order)

View Set