You may be able to identify the IP addresses and machine names for the firewall, and the names of internal mail servers by:
Which of the following IP addresses will respond to the ping and hence will likely be responsible for the the intrusion?
Bob, an Administrator at pass4sure was furious when he discovered that his buddy Trent, has launched a session hijack attack against his network, and sniffed on his communication, including administrative tasks suck as configuring routers, firewalls, IDS, via Telnet. Bob, being an unhappy administrator, seeks your help to assist him in ensuring that attackers such as Trent will not be able to launch a session hijack in pass4sure. Based on the above scenario, please choose which would be your corrective measurement actions (Choose two)
Carl has successfully compromised a web server from behind a firewall by exploiting a vulnerability in the web server program. He wants to proceed by installing a backdoor program. However, he is aware that not all inbound ports on the firewall are in the open state. From the list given below, identify the port that is most likely to be open and allowed to reach the server that Carl has just compromised.