Top » Catalog » IMT-CDL-Old »


IMT-94: Network Security Threats Attacks and Loopholes-MT1

IMT-94: Network Security Threats Attacks and Loopholes-MT1













IMT - 94: Network Security Threats Attacks and Loopholes



1. What is social engineering? Describe different types of social engineering attacks.

2. Give ideas of social engineering attacks that could possibly be implemented on people around you.

3. What is the difference between intimidation and impersonation?

4. Describe the various types of password cracking attacks.

5. Give three examples of weak passwords.

6. Give three examples of strong passwords.

7. How can an attacker crack a UNIX password?

8. How can an attacker crack a WINDOWS password?

9. How can an attacker crack a Screen Saver password?

10. What are default passwords? Why are they enabled in applications by software developers?


1. Describe the functions, structure and uses of the various layers of TCP/IP.

2. What is the use of checksum on the Internet?

3. What is the use of sequencing on the Internet?

4. How can an attacker carry out IP spoofing?

5. What are the four biggest challenges associated with IP spoofing?

6. What are the advantages of proxy bouncing compared with proxy servers? How can you carry out proxy bouncing?

7. What are trust relationships? Are they more secure than username-password authentication?

8. What are the three steps of connection establishment and connection termination respectively?

9. Describe the functions of the following data packets: ACK, SYN, FIN, URG and PSH.

10. What role do DOS attacks play in IP spoofing?


1. Download the file named from the course mailing list and crack its password. (Kindly submit the cracked password as your answer).

2. Imagine that you are a social engineer and you wish to find out the bank account number of Mr A. You decide to call the call centre of the bank and carry out a social engineering attack. How would you do it? Kindly do not actually carry out such an attack, simply submit conversation records/logs of a social engineering attack.

Quick Find
Use keywords to find the product you are looking for.
Advanced Search
1 x Business Communication-ISBM-2
1 x Operation Management-ISBM-1
1 x Business Admin-1-ISBM
1 x Marketing Management-ISBM-1
1 x Purchasing and Materials Management-ISBM-1
1 x BusinessEnvironment-ISBM-1
1 x IMT-100: Software Project Management-2014
1 x IMT-31: Web Technology-2014
1 x IMT-58: Management Accounting-2014
1 x IMT-36: Java Programming-2014
1 x IMT-14: Organization Structure and Behaviour-2014
1 x NLU-05: Intellectual Property Rights in Digital Environment-II-M
1 x IMT-59: Financial Management-2014
1 x IMT-101: Networking and Telecom Management-16
1 x IMT-98: System Forensics-2014
1 x NLU-06: IT Act and Internet Governance-MT1-14
1 x IMT-95: Security Solutions-2014
1 x IMT-10: Business Communication-2014
1 x IMT-16: International Trade-2014
1 x CAM-Computer Aided Management-2014
1 x NLU-04: E-Banking n Electronic Payment System-14
1 x IMT-17: International Marketing-2014
1 x IMT-11: Managing People-2014
1 x IMT-70: Marketing Of Service Industry-2014
1 x IMT-74: Managing Human Resource in Global Environment-2014
1 x IMT-93: Different Types of Attacks-2014
1 x IMT-72: Rural Marketing-2014
1 x IMT-97: Mobile Platforms Security-2014
1 x IMT-57: Financial Accounting-2014
1 x IMT-48: DOT Net Programming-2014
1 x IMT-139-Enterprise Response Planning-16
1 x IMT-92: Network Security-2014
1 x IMT-94: Network Security Threats Attacks and Loopholes-2014
1 x IMT-61: Corporate Finance-2014
1 x IMT-91: Basics of Security-2014
1 x IMT-49: Business Ethics-2014
1 x IMT-01: Management Process and Organization-2014
1 x NLU-03: Intellectual Property Rights in Digital Environment-I-14
1 x IMT-63: Group Dynamics and Managing Change-2014
1 x IMT-62: Strategic HRD-2014
1 x IMT-12: Human Resource Management-2014
1 x IMT-24: Quantitative Technique-2014
1 x IMT-102: Database Adminitration-2014
1 x IMT-05: Advertisement and Sales Promotion-2014
1 x IMT-54: Business Law-2014
1 x IMT-40: Marketing management-2014
1 x IMT-75: Brand Management-2014
1 x IMT-86: International financial management-2014
1 x IMT-60: Training And Development-2014
1 x IMT-07: Working Capital Management-2014
1 x IMT-96: Software Hacking-2014
1 x IMT-20: Managerial Economics-2014
1 x IMT-65: MIS-Management Information Systems-2014
1 x IMT-09: Security Analysis and Portfolio Management-2014
1 x IMT-15: Production and Operations Management-2014
1 x IMT-18: Export Finance and Documentation-2014
1 x IMT-77: E-Business-2016
1 x NLU-08: CyberCrimesComputerForensicsAndDigitalEvidence-14
1 x IMT-13: Management Union Relation-2014
1 x IMT-41: Indian Financial Services-2014
1 x NLU-07: Informational Technology Management-14
Share Product

osCommerce Online Merchant Copyright © 2010 osCommerce
osCommerce provides no warranty and is redistributable under the GNU General Public License
Note: We provide all Solutions and Contents for Reference/Study purpose only.