CPSA MQ1 Flashcards

(90 cards)

1
Q

Why can remote access VPNs not use Main Mode for IKE Phase-1 if the authentication method is pre-shared key?

A

Because pre-shared key authentication with Main Mode requires that the peer’s IP is known before the connection is established.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the blocksize of the DES encryption cipher?

A

64 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is this: 16:23:57.094021 IP 192.168.124.204.137 > 192.168.124.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST

A

A NetBIOS over TCP/IP name service broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which is the least secure encryption cipher of those listed below?

A

DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which file in a user’s home directory controls the trust relationships for Berkeley R services?

A

rhosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which operating system is most likely to be vulnerable to the TTYPROMPT vulnerability in the telnet service?

A

Solaris 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following algorithms could be used to negotiate a shared encryption key?

A

Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why might a tester insert the string “alert(“it works”)” into a web form?

A

To check for a Cross-Site Scripting vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which protocols are associated with PPTP?

A

TCP port 1723 and IP protocol 47

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where are the encrypted passwords stored on a Solaris system?

A

/etc/shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements about the rwho protocol is true?

A

The rwho daemon sends regular broadcasts to UDP port 513, and listens to broadcasts from other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How would you establish a null session to a windows host from a windows command shell?

A

NET USE \hostname\ipc$ “” /u:””

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If the account lockout threshold is set to 5, how many incorrect password attempts will cause the built in administrator account to be locked out on a Windows 2003 system?

A

The built in administrator account will never be locked out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What effect would an octal umask of 0027 have on the permissions of new files?

A

Remove group write access, and remove all permissions for others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name given to the field concerned with the security implications of electronic eminations from communications equipment?

A

TEMPEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of these is not a valid IPv6 address?

A

2001:0db8:1428:57ab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You discover an Internet accessible anonymous FTP server on a client’s internal network, which is vulnerable to the FTP bounce attack. What is the impact of this vulnerability?

A

Attackers could exploit the vulnerability to port scan other systems on the client’s internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What would you expect the command “finger 0@hostname” (that is a zero) against a Solaris 8 system to display?

A

Users with an empty GCOS field in the password file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the four potential risk treatments

A

Avoid, Reduce, Accept and Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does “export” signify for an SSL cipher

A

It is a weak cipher that was acceptable for export under the old US cryptography export regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of these protocols is not vulnerable to address spoofing if implemented correctly?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What effect does setting the RestrictAnonymous registry setting to 1 have on a Windows NT or 2000 system?

A

It prevents enumeration of SAM accounts and names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What command would you use to list the installed packages on a Solaris system?

A

pkginfo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which protocols and ports are used by Telnet, SMTP and Finger?

A

TCP/23, TCP/25 and TCP/79.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What would an SNMP request to set OID 1.3.6.1.4.1.9.2.1.55.10.0.0.1 to "file" on a Cisco router using a community string with read/write access do?
Cause the target router to upload its configuration file to the TFTP server at 10.0.0.1 as a file called "file".
26
What RPC authentication mechanism does NFS v2 and v3 use?
AUTH_SYS, using Unix UID and GID
27
Which of these statements about the Windows built in administrator account is correct?
It always has RID 500
28
What does the "Root Squash" option on an NFS export do?
Makes the root user on the NFS client access files as nobody on the server
29
With blind SQL injection, the results of the injection are not visible, and no errors are displayed. How can blind SQL injection be detected?
The web server behaviour changes when a successful injection is performed.
30
What does the phrase "Inherent Risk" mean in risk management?
A risk that is implicitly associated with an activity or location.
31
Which of the following cipher modes use a block cipher to generate a key stream that can be used as a stream cipher?
CFB
32
What is the digest length for the SHA1 hash function?
160 bits
33
What is the default password for the DBSNMP user on Oracle 9i?
DBSNMP
34
Which of these groups of tools are commonly used for packet crafting?
hping2, hping3 and scapy
35
The active directory database file is:
NTDS.DIT
36
Which nmap flag enables OS TCP/IP stack fingerprinting?
-O
37
Which of the following is NOT an EAP method?
EAP-RSA
38
What is the significance of the string "SEP" in the configuration filename of a Cisco IP phone?
It stands for Selsius Ethernet Phone, which was the original name of the Cisco IP phone.
39
Which of these is an IP option?
Record Route
40
Which of the following are all ONC/RPC services?
cmsd, kcms_server, sadmind, snmpXdmid.
41
When was the Apache chunked encoding vulnerability fixed in version 1.3?
1.3.26
42
An accepted limitation of Diffie-Hellman key agreement protocol is
It is vulnerable to a man-in-the-middle attack
43
What are the privileged TCP and UDP ports, which only a privileged user can listen on?
0 - 1023 inclusive
44
What attack can be used to force some switches to forward frames to all ports?
MAC flooding
45
Which of the following protocols is the most secure?
WPA with CCMP (AES)
46
What command would you use to display the version number of a Microsoft SQL Server database if you are connected with a command line client?
select @@version;
47
A web server returns "Server: Microsoft-IIS/5.0" in the HTTP headers. What operating system is it probably using?
Windows 2000 Server
48
Some older TCP implementations are vulnerable to a DoS attack that exploits the small queue for connections in progress?
SYN flood
49
What is the function of the /etc/ftpusers file on a Unix FTP server?
It lists the users that are NOT permitted to use the FTP server.
50
In active directory, what does FSMO (pronounced "Fizz-Mo") stand for?
Flexible Single Master Operations
51
What TCP port does Microsoft SQL Server listen on in hidden mode?
2433
52
During a penetration test, you gain access to a database containing personal details of staff. What is the best course of action?
Note the issue but do not store any of the personal data on your system.
53
When should the scope of work be defined?
Before testing is started
54
Which of these techniques is commonly implemented in modern C compilers to prevent buffer overflow exploitation?
Canary values
55
Which of the following encryption algorithms is an asymmetric cipher?
RSA
56
What are the valid key lengths for the AES encryption cipher?
128, 192 and 256
57
Which are the six base SIP methods?
REGISTER, INVITE, ACK, CANCEL, BYE, OPTIONS
58
Which scan would be most likely to discover a firewall that blocks all traffic to itself from the interface connected to the network you are scanning from?
ARP scan
59
You find a system that is offering the NFS RPC service. What is the logical next step?
Run "showmount -e" to list the NFS exports.
60
What is this: password 7 052D131D33556C081D021200
A password encoded with the reversible Cisco vigenere algorithm
61
What identifies the superuser on a Unix or Linux system?
Any user with UID 0 (zero) in the password file
62
Which command will retrieve the version number from default installations of the BIND nameserver software?
dig @nameserver version.bind txt chaos
63
The UK Government protective marking levels are, from lowest to highest protection:
NPM, PROTECT, RESTRICTED, CONFIDENTIAL, SECRET, TOP SECRET
64
What are the SIP and RTP protocols used for in VoIP?
SIP is used for setting up and closing down calls, and RTP is used for audio data transmission.
65
What is the primary legal reason for obtaining written permission before starting a test?
Because otherwise the penetration test might breach the Computer Misuse Act
66
Which of the following statements about the time protocols "time", "daytime" and "NTP" are correct?
"time" represents the time as a 32-bit value, "daytime" uses an ASCII string, and "NTP" uses a 64-bit value.
67
Which of these is not a valid IP address?
192.168.300.1
68
What command would you use to list the installed patches on a Solaris system?
showrev -a or showrev -p
69
On a Unix system, what is the effect of the execute bit on a directory?
It allows the directory to be traversed
70
What is this: 17:58:01.396446 CDPv2, ttl: 180s, Device-ID 'chestnut.nta-monitor.com', length 404
A CDP broadcast
71
What are the four mandatory transform attributes for an IKE Phase-1 SA?
Encryption Algorithm, Hash Algorithm, Authentication Method, Diffie Hellman Group
72
What command would you use to list the installed packages on a Redhat or Fedora system?
rpm -qa
73
Where are the encrypted passwords stored on a FreeBSD system?
/etc/master.passwd
74
You discover a vulnerability on an Internet accessible web server which allows you to execute commands as a non-privileged user. The web server is behind a firewall that allows only TCP port 80 inbound and permits all outbound traffic. What technique could be used to get shell access to the webserver?
Run a shell on the webserver and connect its control channel back to a TCP port on your local system
75
If you find TCP port 111 open on a Unix system, what is the next logical step to take?
Run "rpcinfo -p" to enumerate the RPC services.
76
Which protocol and port does a normal DNS lookup use?
UDP port 53
77
Which of the following web application technologies would you expect to be most secure?
A pure Java application.
78
Which nmap command performs a half-open or "SYN" TCP portscan?
nmap -n -P0 -v -sS -p1-1024 hostname
79
Which command will perform a DNS zone transfer of the domain "company.com" from the nameserver at 10.0.0.1?
dig @10.0.0.1 company.com axf
80
What is this: 17:57:57.850175 802.1d config 8064.00:0c:85:f1:3f:80.8010 root 8064.00:0b:46:48:29:80 pathcost 19 age 1 max 20 hello 2 fdelay 15
A Spanning Tree Protocol broadcast
81
Which of these is not an ICMP message type?
Host unreachable
82
What version of NFS includes strong security, including strong authentication and encryption?
version 4
83
The DNS entries for www.customer.com and www.example.com both point to the same IP address. How does the web server know which domain is being requested by the browser?
It uses the HTTP Host: header.
84
If an attacker gained access to a Microsoft SQL server using the "sa" account, which stored procedure would he use to add a user account?
xp_cmdshell
85
Which of these is an Ethernet multicast MAC address?
01:00:0c:cc:cc:cc
86
what technique forwards traffic to an attacker's system by associating the attacker's MAC address with the IP address of the target system?
ARP spoofing or ARP poisoning
87
Which of these methods is the best way to determine if a remote host is running an X Window server that allows remote connections from the local host?
Run "xdpyinfo -display remotehost:0.0"
88
What is the default password for the SYS user on Oracle 10g?
CHANGE_ON_INSTALL
89
UDP port 1434 is commonly used by which database?
Microsoft SQL Server
90
AJAX is
Asynchronous Javascript and XML