Academiclub.com
 
Member Sign-In | Register Now  
 
Call us : + 91- 7840008585
Email Id : info@academiclub.com
Untitled Document
 
 

 

 
IMT New April 2014 Onward IMT-91: Basics of Security
 
Product Name : IMT-91: Basics of Security
Product Code : AC1
Category : IMT
Hand Written : Rs. 999    img
Soft Copy Type A : Rs. 200    img
Soft Copy Type B  : Rs. 500   img
 
      Share |
Description :

PART - A

1. What is an IP address? What are the various forms of an IP address? What are the various ways in which you can trace an IP address on the Internet?

2. Imagine that you are a cyber terrorist and you are planning a major cyber attack. Of course you don't want to get caught! What are the various strategies you will employ to protect your identity and prevent the police from tracing you?

3. How can you find out the IP address of a system hiding behind a proxy server?

4. Write down the IP address 163.114.24.14 in the following notation formats:

l Decimal

l Hexadecimal

l Octal

l Binary

l DWORD

5. What are the differences and similarities between ping and tracert?

6. From a system administrator's perspective, which ICMP utility is more dangerous: ping or tracert? Give reasons to support your answer. Which counter-measures can a system administrator employ to counter it?

7. Describe three port scanning techniques. Give their pros and cons.

8. How can you carry out stealth port scanning on a target system?

9. How can you use ICMP scanning to carry out OS detection? Which counter-measures can a system administrator implement to prevent ICMP OS detection?

10. What are the advantages of carrying out ping sweeping? How can a system administrator detect that ping sweeping is taking place? How can it be countered?

 

PART - B 

1. What are the differences and similarities between active fingerprinting and passive fingerprinting?

2. How can an attacker perform passive fingerprinting? Describe in detail.

3. What counter-measures can be taken to prevent fingerprinting probes?

4. What is the regedit file? Describe its structure, format and uses.

5. Describe any three windows registry tweaks of your choice.

6. What are sniffers? How can you use a sniffer to record data packets being sent/received on a network?

7. How can a system administrator make it more difficult for an attacker to carry out information gathering?

8. Which information gathering technique is the most important from the attacker's perspective?

9. How can a system administrator mislead an attacker during the process of information gathering?

10. How can an attacker modify the registry on a remote system?

 

PART - C

1. Find out if the following systems are alive. If they are alive, then find out their exact geographical information

(Kindly submit actual logs as your answer):

203.94.11.12

203.94.12.11

www.hackingmobilephones.com

www.imt.edu

2. UsE all information gathering techniques taught in this course to find out as much information as possible about the following systems (Kindly submit actual logs as your answer):

www.hackingmobilephones.com

www.imt.edu

 
Academiclub.com
 
  Useful Links
Home
Sample Work
Services
Projects
  Useful Links
How It Work
Enquiry
Contact Us
FAQ's
  Links
Terms & Condition
Privacy Policy
Customer Care : +91-7840008585
Email Consumer Care


 
Connect with us
Copyright © 2013-2021 Academiclub.com