Page 802 - StudyBook.pdf
P. 802

786    Appendix • Self Test Appendix

             7.  A number of scans are being performed on computers on the network.When determining
                 which computer is running the scans on these machines, you find that the source of the scans
                 are the FTP server.What type of attack is occurring?
                  A. Bounce attack
                  B. Phishing
                  C. DoS
                  D. Web site spoofing
              A. Bounce attack.A bounce attack occurs when scans are run against other computers through
                 the FTP server, so that it appears the FTP server is actually running the scans.The scans can be
                 performed due to a mechanism in FTP called proxy FTP, which allows FTP clients to have the
                 server transfer the files to a third computer.
              Answer B is incorrect, because phishing involves tricking users to provide information they
                 normally wouldn’t make available, such as through e-mails or Web sites requesting confidential
                 information.Answer C is incorrect, because a DoS attack is a Denial of Service attack in which
                 a hacker overwhelms a system, such as by making a massive number of requests on a Web
                 server.Answer D is incorrect, because Web spoofing involves tricking Web browsers to connect
                 to a different Web server than the user intended.
             8.  You are attempting to query an object in an LDAP directory using the distinguished name of
                 the object.The object has the following attributes:
                 cn: 4321
                 givenName: John
                 sn: Doe
                 telephoneNumber: 905 555 1212
                 employeeID: 4321
             mail: jdoe@nonexist.com
             objectClass: organizationalPerson

              Based on this information, which of the following would be the distinguished name of the object?
                  A. dc=nonexist, dc=com
                  B. cn=4321
                  C. dn: cn=4321, dc=nonexist, dc=com
                  D. jdoe@nonexist.com
              C. dn: cn=4321, dc=nonexist, dc=com.The distinguished name is a unique identifier for the
                 object, and is made up of several attributes of the object. It consists of the relative distinguished
                 name, which is constructed from some attribute(s) of the object, followed by the distinguished
                 name of the parent object.
              Answer A is incorrect, because this identifies the root of the tree.Answer B is incorrect,
                 because this identifies the common name of the object.Answer D is incorrect, because this is
                 the user account’s e-mail address.



          www.syngress.com
   797   798   799   800   801   802   803   804   805   806   807