Question 1
By default, where are the IIS logs recorded?
Question 2
Which steps should be taken to increase web server security? (Select all that apply.)
Question 3
IP spoofing is not difficult and can be used in a variety of attacks. However, the attacker will not see the packets that are returned to the spoofed IP address. In this case, the attacker uses ______________ and then sniffs the traffic as it passes.
Question 4
Which of the following is the best countermeasure against hijacking? (Select all that apply.)
Question 5
This IIS 7 component allows clients to publish, locks and manages resources on the web, and should be disabled on a dedicated server.