Question: A good software or hardware firewall would most likely identify traffic thats using unfamiliar ports, but Trojan programs that use common ports, such as TCP

  1. A good software or hardware firewall would most likely identify traffic thats using unfamiliar ports, but Trojan programs that use common ports, such as TCP port 80 (HTTP) or UDP port 53 (DNS), are more difficult to detect.
    1. True
    2. False
  2. Which statement is incorrect about the process of port redirection:
    1. The first step requires the attacker to listen on a port to send but not receive data.
    2. The attacker will drop a malicious payload on the victims system to execute system level commands
    3. The attacker will drop a malicious payload on the victims system to execute system level commands
    4. Payloads can be delivered via email, crafted scripts, malicious files, and so on.
  3. The Netcat utility which comes built-in with Zenmap can enable an attacker completely control a victims system but not perform any desired actions such as browsing files, creating persistent backdoor or accessing the cmd.exe tool.
    1. True
    2. False
  4. There are two entities in the process of port redirection, the attacker and the victim.
    1. True
    2. False
  5. In the Performing Port Redirection task, to set up a listener, at the command prompt, you type the following command:

ncat -port -v -l -p 8080

    1. True
    2. False
  1. You can track the port usage of devices using a Windows program known as TCPView. This program displays the entire list of all Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) endpoints on the devices. The list also includes the local and remote addresses and state of TCP connections.
    1. True
    2. False
  2. Antivirus programs cannot mitigate risks associated with malware, but users who are trained thoroughly can open holes into a network that no technology can protect against.
    1. True
    2. False

Please help!!!

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!