Page 802 - StudyBook.pdf
P. 802
786 Appendix • Self Test Appendix
7. A number of scans are being performed on computers on the network.When determining
which computer is running the scans on these machines, you find that the source of the scans
are the FTP server.What type of attack is occurring?
A. Bounce attack
B. Phishing
C. DoS
D. Web site spoofing
A. Bounce attack.A bounce attack occurs when scans are run against other computers through
the FTP server, so that it appears the FTP server is actually running the scans.The scans can be
performed due to a mechanism in FTP called proxy FTP, which allows FTP clients to have the
server transfer the files to a third computer.
Answer B is incorrect, because phishing involves tricking users to provide information they
normally wouldn’t make available, such as through e-mails or Web sites requesting confidential
information.Answer C is incorrect, because a DoS attack is a Denial of Service attack in which
a hacker overwhelms a system, such as by making a massive number of requests on a Web
server.Answer D is incorrect, because Web spoofing involves tricking Web browsers to connect
to a different Web server than the user intended.
8. You are attempting to query an object in an LDAP directory using the distinguished name of
the object.The object has the following attributes:
cn: 4321
givenName: John
sn: Doe
telephoneNumber: 905 555 1212
employeeID: 4321
mail: jdoe@nonexist.com
objectClass: organizationalPerson
Based on this information, which of the following would be the distinguished name of the object?
A. dc=nonexist, dc=com
B. cn=4321
C. dn: cn=4321, dc=nonexist, dc=com
D. jdoe@nonexist.com
C. dn: cn=4321, dc=nonexist, dc=com.The distinguished name is a unique identifier for the
object, and is made up of several attributes of the object. It consists of the relative distinguished
name, which is constructed from some attribute(s) of the object, followed by the distinguished
name of the parent object.
Answer A is incorrect, because this identifies the root of the tree.Answer B is incorrect,
because this identifies the common name of the object.Answer D is incorrect, because this is
the user account’s e-mail address.
www.syngress.com