Practice Test Questions Flashcards
(262 cards)
A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees don’t like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers.
A. tcp.port = 23
B. tcp.port == 21
C. tcp.port != 21
D. tcp.port == 21 || tcp.port == 22
B. tcp.port == 21
Bob is working as a pen-tester in an organization in Dallas. He performs penetration testing on the IDS to find ways an attacker might evade the IDS. Bob sends large amounts of packets to the IDS which generates a large number of alerts. This enables Bob to hide the real traffic. What type of method is Bob using to evade the IDS?
A. Denial of service
B. Insertion Attack
C. False Positive Generation
D. Obfuscating
C. False Positive Generation
This international organization regulates billions of transactions daily and provides security guidelines to protect personally identifiable information (PII). These security controls provide a baseline and prevent low-level hackers sometimes known as script kiddies from causing a data breach.
Which of the following organizations is being described?
A. Institute of Electrical Electronics Engineers (IEEE)
B. Center of Disease Control (CDC)
C. Payment Card Industry (PCI)
D. International Security Industry Organization (ISIO)
C. Payment Card Industry (PCI)
True or False; An anomaly-based IDS can identify unknown attacks (attacks without signatures) and signature-based IDS cannot.
True
False
True
Which of the following password protection techniques adds a random string of characters to the password before calculating their hashes?
A. Double Hashing
B. Key Stretching
C. Keyed Hashing
D. Salting
D. Salting
Which of the following commands will perform an Xmas scan using nmap?
A. nmap -sX 192.168.1.250
B. nmap -sA 192.168.1.250
C. nmap -sV 192.168.1.250
D. nmap -sP 192.168.1.250
A. nmap -sX 192.168.1.250
Which of the following is the BEST way to defend against network sniffing?
A. Using encryption protocols to secure network communications
B. Register all machines MAC address in a centralized Database
C. Use Static IP Address
D. Restrict Physical Access to Server Rooms hosting Critical Servers
A. Using encryption protocols to secure network communications
What is the process for allowing or blocking a specific port in the Windows firewall? (For example, TCP port 22 inbound)
A. This is not possible without installing third-party software, since Windows only allows changing firewall settings for individual applications.
B. A rule matching these requirements can be created in “Windows Firewall with Advanced Security”, located in the control panel.
C. The only way to implement a specific rule like this is to use the “netsh” program on the command-line.
D. The firewall rule must be added from within the application that is using that port.
B. A rule matching these requirements can be created in “Windows Firewall with Advanced Security”, located in the control panel.
You perform a scan of your company’s network and discover that TCP port 123 is open. What services by default run on TCP port 123?
A. DNS
B. Telnet
C. Network Time Protocol
D. POP3
C. Network Time Protocol
When configuring wireless on his home router, Javik disables SSID broadcast. He leaves authentication “open”, but sets the SSID to a 32 character string of random letter and numbers. What is an accurate assessment of this scenario from a security perspective?
A. Javik’s router is still vulnerable to wireless hacking attempts, because the SSID broadcast setting can be enables using a specially crafted packet sent to the hardware address of the access point.
B. It is still possible for a hacker to connect to the network after sniffing the SSID from a successful wireless association.
C. Disabling SSID broadcast prevents 802.11 beacons from being transmitted from the access point,
resulting in a valid setup leveraging “security through obscurity”.
D. Since the SSID is required in order to connect, the 32-character string is sufficient to prevent brute-force attacks.
B. It is still possible for a hacker to connect to the network after sniffing the SSID from a successful wireless
association.
In cryptanalysis and computer security, 'pass the hash' is a hacking technique that allows an attacker to authenticate to a remote server/service by using the underlying NTLM and/or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case. Metasploit Framework has a module for the technique; psexec. The psexec module is often used by penetration testers to obtain access to a given system that you already know the credentials for. It was written by sysinternals and has been integrated within the framework. Often as penetration testers, successfully gain access to a system through some exploit, use meterpreter to grab the passwords or other methods like fgdump,pwdump, or cachedump and then utilize rainbow tables to crack those hash values.
Which of the following is true hash type and sort order that is used in the psexec module’s ‘smbpass’
A. NTLM:LM
B. LM:NT
C. LM:NTLM
D. NT:LM
C. LM:NTLM
Identify the UDP port that the Network Time Protocol (NTP) uses as it’s primary means of communication.
A. 113
B. 161
C. 69
D. 123
D. 123
A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much information can be obtained from the firm’s public facing web servers. The engineer decides to start using netcat to port 80. The engineer receives this output:
HTTP/1.1 200 OK Server: Microsoft-IIS/6 Expires: Tue, 17 Jan 2011 01:41:33 GMT Date: Mon, 16 Jan 2011 01:41:33 GMT Content-Type:text/html Accept Ranges: bytes Last-Modified: Wed, 28 Dec 2010 15:32:21 GMT ETag: “b0aac0542e25c31:89d” Content-Length: 7369
Which of the following is an example of what the engineer performed?
A. Cross-site scripting
B. Whois database query
C. SQL injection
D. Banner grabbing
D. Banner grabbing
You type the following command at a Linux command prompt:
hping3-c 65535 -i u1 -S -p 80 –rand-source www.targetcorp.com
What action are you performing?
A. Ping of death
B. Port scan of all UDP ports
C. Idle scan of TCP port 80
D. SYN flood
D. SYN flood
Elliot is in the process of exploiting a web application that uses SQL as a back-end database. He’s determined that the application is vulnerable to SQL injection, and has introduced conditional timing delays into injected queries to determine whether they are successful. What type of SQL injection is Elliot most likely performing?
A. Error-based SQL injection
B. Blind SQL injection
C. Union-based SQL injection
D. NoSQL injection
B. Blind SQL injection
How can rainbow tables be defeated?
A. All uppercase character passwords
B. Passwords salting
C. Use of non-dictionary words
D. Lockout accounts under brute force password cracking attempts
B. Passwords salting
You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. While monitoring the data, you find a high number of outbound connections. You see the IP’s owned by XYZ (internal) and private IP’s are communicating to a Single Public IP is a blacklisted IP, and the internal communicating devices are compromised.
What kind of attack does the above scenario depict?
A. Rootkit Attack
B. Botnet Attack
C. Spear Phishing Attack
D. Advanced Persistent Threats
B. Botnet Attack
The name for tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?
A. Network Sniffer
B. Intrusion Prevention Server
C. Vulnerability Scanner
D. Security Incident and Event Monitoring
D. Security Incident and Event Monitoring
In the field of cryptanalysis, what is meant by a “rubber-hose” attack?
A. A backdoor placed into a cryptographic algorithm by its creator.
B. Extraction of cryptographic secrets through coercion or torture.
C. Forcing the targeted key stream through a hardware-accelerated device such as an ASIC.
D. Attempting to decrypt cipher text by making logical assumptions about the contents of the original plaintext.
B. Extraction of cryptographic secrets through coercion or torture.
While scanning with Nmap, Patin found several hosts which have the IP ID sequence of incremental. He then decided to conduct: map - Pn -p- -sl kiosk.adobe.com www.riaa.com Whereas kiosk.adobe.com is the host with incremental IP ID sequence. What is the purpose of using “-sl” with Nmap?
A. Conduct silent scan
B. Conduct stealth scan
C. Conduct ICMP scan
D. Conduct IDLE scan
D. Conduct IDLE scan
What TCP scanning method is unlikely to set off network IDS?
A. TCP connect scan
B. TCP SYN scan
C. TCP FIN scan
D. TCP ACK scan
B. TCP SYN scan
A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client.
What is a possible source of this problem?
A. Client is configured for the wrong channel
B. The WAP does not recognize the client’s MAC address
C. The client cannot see the SSID of the wireless network
D. The wireless client is not configured to use DHCP
B. The WAP does not recognize the client’s MAC address
If an attacker uses the command SELECT*FROM user WHERE name =’x’ AND userid IS NULL;– which type of SQL injection attack is the attacker performing?
A. Illegal/Logically Incorrect Query
B. Tautology
C. End of Line Comment
D. UNION SQL Injection
C. End of Line Comment
In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4?
A. Vulnerabilities in the application layer are greatly different from IPv4
B. Implementing IPv4 security in a dual-stack network offers protection from IPv6 attacks too.
C. Due to the extensive security measures built in IPv6, application layer vulnerabilities need not be addressed
D. Vulnerabilities in the application layer are independent of the network layer. Attacks and mitigation
techniques are almost identical.
D. Vulnerabilities in the application layer are independent of the network layer. Attacks and mitigation
techniques are almost identical.