Practice Questions Flashcards
The CIA model of security consists of Confidentiality, Integrity and Availability. Which of the following is also a highly desirable security feature of a networked environment?
A Security Cleared Employees
B Connectivity
C Authenticity
D IPv6
C - Authenticity
Which of the following tools would you not use for packet capturing on a IPv4 TCP/IP network?
A Tcpdump
B Wireshark
C Nikto
D SmartSniff
C - Nikto
With the Domain Name System (DNS), the PTR record is used to?
A Refer to a Mail Server
B Map an name to an IP address
C Express a zone of control
D Map an IP address to a name
D - Map an IP address to a name
Most ARP poisoning tools work by creating which of the following?
A A fake ARP request that is a unicast.
B A fake ARP request that is a multicast.
C A fake ARP reply that is a unicast.
D A fake ARP reply that is a broadcast.
B - A fake ARP request that is a multicast.
With the Domain Name System (DNS), the MX record is used to?
A Refer to a Mail Server
B Express host information
C Express a zone of control
D To define an name server for a zone
A - Refer to a Mail Server
Which of the following best describes freely available material on the internet, which may be useful to an attacker?
A Open source intelligence (OSINT)
B Available Access Data
C Human Intelligence (HUMINT)
D Signal Intelligence (SIGINT)
A - Open source intelligence (OSINT)
Which of the following statements is not true for IPv4?
A The IPv4 protocol is primary concerned with routing.
B The IPv4 protocol operates at OSI level 5 of the OSI reference model.
C The IPv4 makes use of 32bit integers to for source and destination addressing.
D The IPv4 protocol contains a header checksum
B - The IPv4 protocol operates at OSI level 5 of the OSI reference model.
Which of the following statements is not true for TCP?
A The TCP protocol is primary concerned reliability.
B The TCP protocol operates at OSI level 4/5 of the OSI reference model.
C The TCP protocol supports positive acknowledgement and retransmission
D The TCP protocol contains no error checking
D - The TCP protocol contains no error checking
With regard to the TCP connection initialisation phase, which of the following is the TCP three way handshake that results in the TCP protocol establishing a bi-directional reliable data connection?
A Syn/Rst - Syn - Ack.
B Syn - Syn/Ack – Ack
C Ack - Ack/Syn – Syn
D Syn - Ack/Ack – Syn
B - Syn - Syn/Ack – Ack
Using Domain Internet Groper command (Dig), we can achieve a zone transfer via use of the following option.
A zxtr
B xafr
C axfr
D zxta
C - axfr
Which of the following statements is true for UDP?
A UDP is stateless and therefore not used where reliability is a requirement
B UDP is stateful
C UDP supports retransmission
D UDP supports security
A - UDP is stateless and therefore not used where reliability is a requirement
Which of the following terms best describes a piece of malware, which travels between computer systems without human intervention?
A Virus
B Worm
C Trojan Horse
D Trapdoor
B - Worm
Which of the following statements is true for the Telnet Protocol?
A It does not implement any form of data encryption inside the TCP packet.
B It was designed to support secure remote access to a computer system
C It typically runs on TCP port 22
D It supports the use of digital certificates
A - It does not implement any form of data encryption inside the TCP packet.
Which of the following functions can the ICMP protocol not be used for?
A Routers sending error messages to other routers and hosts.
B Identification of the network address of a given host.
C Controlling the rate of flow of information between network interface cards.
D Identification of a hostname from an IP address.
C - Controlling the rate of flow of information between network interface cards.
Best Practice for security reviews consist of 4 stages, which of the following is not one of these stages?
A Network enumeration to identify IP networks and hosts of interest
B Frequency analysis of network packet protocols
C Bulk network scanning and probing to identify potentially vulnerable hosts
D Exploitation of vulnerabilities and circumvention of security mechanisms
B - Frequency analysis of network packet protocols
Which of the following statements best describes the principles underlying RIP protocol?
A It is an implementation of black hole routing for local networks
B It is an implementation of the shortest path routing for local networks
C It is an implementation of n-dimension vector matrix routing for local networks
D It is an implementation of distance vector routing for local networks
D - It is an implementation of distance vector routing for local networks
Which of the following statements best describes the principles underlying security in the RIP Version 1 protocol?
A It was not designed with security
B It implements security via digital signatures
C It implements security via a shared symmetric key
D It implements security via digital signatures and IPSEC
A - It was not designed with security
The OSPF supports which of the following authentication methods?
A It implements authentication via a shared asymmetric key
B It implements authentication via digital signatures
C It implements authentication via a simple password which is sent in the clear
D It implements authentication via a hash of the password
C - It implements authentication via a simple password which is sent in the clear
OSPF send its authentication via which of the following message types?
A HELLO
B AUTHENT
C TOPOLOGY
D INTRO
A - HELLO
Using RIPv1 how do routers communicate with each other?
A Via unicast
B Via broadcast
C Via multicast
D Via point to point secure messaging
B - Via broadcast
CVE Stands for?
A Common Vulnerabilities and Exposures
B Computer Vulnerability Exposure
C Common Vulnerability Element
D Computer Vulnerability Element
A - Common Vulnerabilities and Exposures
Which of the following is true for the following CIDR address: 10.0.0.0/25?
A There are 254 hosts in the address range
B There are 126 hosts in the address range
C There are 62 hosts in the address range
D There are 510 hosts in the address range
B - There are 126 hosts in the address range
To use netstat to display routing tables, which of the following switches is required?
A -a
B -n
C -p
D -r
D - -r
Which of the following is not a recognised security Standard?
A ISO9001
B Orange Book
C ITSEC
D Common Criteria
A - ISO9001