551-600 Flashcards

1
Q

Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port.

Which of the following wireless attacks would this address?

A

D.

Rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Users have been reporting that their wireless access point is not functioning. They state that it allows slow connections to the internet, but does not provide access to the internal network. The user provides the SSID and the technician logs into the company’s access point and finds no issues.

Which of the following should the technician do?

A

C.

Check the MAC address of the AP to which the users are connecting to determine if it is an imposter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ann, the network administrator, has learned from the helpdesk that employees are accessing the wireless network without entering their domain credentials upon connection. Once the connection is made, they cannot reach any internal resources, while wired network connections operate smoothly.

Which of the following is MOST likely occurring?

A

D.

An attacker has installed an access point nearby in an attempt to capture company information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is where an unauthorized device is found allowing access to a network?

A

B.

Rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following attacks would cause all mobile devices to lose their association with corporate access points while the attack is underway?

A

A.

Wireless jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The system administrator has been notified that many users are having difficulty connecting to the company’s wireless network. They take a new laptop and physically go to the access point and connect with no problems.

Which of the following would be the MOST likely cause?

A

D.

An unauthorized access point has been configured to operate on the same channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

After viewing wireless traffic, an attacker notices the following networks are being broadcasted by local access points:

Corpnet
Coffeeshop
FreePublicWifi

Using this information, the attacker spoofs a response to make nearby laptops connect back to a malicious device.

Which of the following has the attacker created?

A

C.

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After a recent breach, the security administrator performs a wireless survey of the corporate network. The security administrator notices a problem with the following output:

MACSSIDENCRYPTIONPOWERBEACONS
00:10:A1:36:12:CCMYCORPWPA2 CCMP601202
00:10:A1:49:FC:37MYCORPWPA2 CCMP709102
FB:90:11:42:FA:99MYCORPWPA2 CCMP403031 00:10:A1:AA:BB:CCMYCORPWPA2 CCMP552021 00:10:A1:FA:B1:07MYCORPWPA2 CCMP306044

Given that the corporate wireless network has been standardized, which of the following attacks is underway?

A

A.

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following types of wireless attacks would be used specifically to impersonate another WAP in order to gain unauthorized information from mobile users?

A

B.

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Matt, an administrator, is concerned about the wireless network being discovered by war driving.

Which of the following can be done to mitigate this?

A

B.

Disable all SSID broadcasting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?

A

B.

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Joe, an employee is taking a taxi through a busy city and starts to receive unsolicited files sent to his Smartphone.

Which of the following is this an example of?

A

B.

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A user commuting to work via public transport received an offensive image on their smart phone from another commuter.

Which of the following attacks MOST likely took place?

A

B.

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is characterized by an attack against a mobile device?

A

C.

Blue jacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following attacks allows access to contact lists on cellular phones?

A

D.

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An administrator has advised against the use of Bluetooth phones due to bluesnarfing concerns.

Which of the following is an example of this threat?

A

B.

Unauthorized intrusions into the phone to access data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

After a user performed a war driving attack, the network administrator noticed several similar markings where Wi-Fi was available throughout the enterprise.

Which of the following is the term used to describe these markings?

A

D.

War chalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is the practice of marking open wireless access points called?

A

B.

War chalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following types of attacks involves interception of authentication traffic in an attempt to gain unauthorized access to a wireless network?

A

B.

IV attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Sara, a security administrator, is noticing a slowdown in the wireless network response. Sara launches a wireless sniffer and sees a large number of ARP packets being sent to the AP.
Which of the following type of attacks is underway?

A

A.

IV attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Maintenance workers find an active network switch hidden above a dropped-ceiling tile in the CEO’s office with various connected cables from the office.

Which of the following describes the type of attack that was occurring?

A

B.

Packet sniffing

22
Q

Which statement is TRUE about the operation of a packet sniffer?

A

C.

The Ethernet card must be placed in promiscuous mode.

23
Q

Which of the following network devices is used to analyze traffic between various network interfaces?

A

D.

Sniffers

24
Q

Which of the following software allows a network administrator to inspect the protocol header in order to troubleshoot network issues?

A

C.

Packet sniffer

25
Q

A security administrator discovered that all communication over the company’s encrypted wireless network is being captured by savvy employees with a wireless sniffing tool and is then being decrypted in an attempt to steal other employee’s credentials.

Which of the following technology is MOST likely in use on the company’s wireless?

A

C.

WEP128-PSK

26
Q

Which of the following protocols is vulnerable to man-in-the-middle attacks by NOT using end to end TLS encryption?

A

B.

WEP

27
Q

Which of the following wireless protocols could be vulnerable to a brute-force password attack? (Choose two.)

A

A.
WPA2-PSK

F.
WEP

28
Q

A victim is logged onto a popular home router forum site in order to troubleshoot some router configuration issues. The router is a fairly standard configuration and has an IP address of

192.168.1.1. The victim is logged into their router administrative interface in one tab and clicks a forum link in another tab. Due to clicking the forum link, the home router reboots.

Which of the following attacks MOST likely occurred?

A

B.

Cross-site request forgery

29
Q

A security administrator develops a web page and limits input into the fields on the web page as well as filters special characters in output.

Which of the following attacks is the administrator trying to prevent?

A

B.

XSS

30
Q

Pete, the security administrator, has been notified by the IDS that the company website is under attack. Analysis of the web logs show the following string, indicating a user is trying to post a comment on the public bulletin board.

INSERT INTO message `source=http://evilsite

This is an example of which of the following?

A

A.

XSS attack

31
Q

Which of the following BEST describes a protective countermeasure for SQL injection?

A

C.

Validating user input in web applications

32
Q

A security administrator looking through IDS logs notices the following entry: (where email = ‘joe@joe.com’ and passwd = ‘or 1==1’)

Which of the following attacks had the administrator discovered?

A

A.

SQL injection

33
Q

Which of the following types of application attacks would be used to specifically gain unauthorized information from databases that did not have any input validation implemented?

A

A.

SQL injection

34
Q

The string:

‘ or 1=1– -

Which of the following represents it?

A

C.

SQL Injection

35
Q

When an order was submitted via the corporate website, an administrator noted special characters (e.g., “;–” and “or 1=1 –”) were input instead of the expected letters and numbers.

Which of the following is the MOST likely reason for the unusual results?

A

D.
The user is sending malicious SQL injection strings in order to extract sensitive company or customer data via the website.

36
Q

Highly sensitive data is stored in a database and is accessed by an application on a DMZ server. The disk drives on all servers are fully encrypted. Communication between the application server and end-users is also encrypted. Network ACLs prevent any connections to the database server except from the application server.

Which of the following can still result in exposure of the sensitive data in the database server?

A

A.

SQL Injection

37
Q

Which of the following BEST describes a SQL Injection attack?

A

A.
The attacker attempts to have the receiving server pass information to a back-end database from which it can compromise the stored information.

38
Q

An attacker attempted to compromise a web form by inserting the following input into the username field: admin) (|(password=*))

Which of the following types of attacks was attempted?

A

D.

LDAP injection

39
Q

Which of the following application attacks is used against a corporate directory service where there are unknown servers on the network?

A

D.

LDAP injection

40
Q

Sara, a hacker, is completing a website form to request a free coupon. The site has a field that limits the request to 3 or fewer coupons. While submitting the form, Sara runs an application on her machine to intercept the HTTP POST command and change the field from 3 coupons to 30.

Which of the following was used to perform this attack?

A

B.

XML injection

41
Q

A malicious individual is attempting to write too much data to an application’s memory.

Which of the following describes this type of attack?

A

C.

Buffer overflow

42
Q

Data execution prevention is a feature in most operating systems intended to protect against which type of attack?

A

B.

Buffer overflow

43
Q

Which of the following application attacks is used to gain access to SEH?

A

B.

Buffer overflow

44
Q

While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down.

Which of the following attacks could be this an example of?

A

B.

Buffer overflow

45
Q

A server administrator notes that a legacy application often stops running due to a memory error. When reviewing the debugging logs, they notice code being run calling an internal process to exploit the machine.

Which of the following attacks does this describe?

A

B.

Buffer overflow

46
Q

Which of the following was launched against a company based on the following IDS log?

122.41.15.252 - - [21/May/2012:00:17:20 +1200] “GET

/index.php?username=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA A
AAA HTTP/1.1” 200 2731 “http://www.company.com/cgibin/

forum/commentary.pl/noframes/read/209” “Mozilla/4.0 (compatible;

MSIE 6.0; Windows NT 5.1; Hotbar 4.4.7.0)”

A

B.

Buffer overflow attack

47
Q

A security administrator examines a network session to a compromised database server with a packet analyzer. Within the session there is a repeated series of the hex character 90 (x90).

Which of the following attack types has occurred?

A

A.

Buffer overflow

48
Q

A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit has been created for a frequently used application. She notifies the software vendor and asks them for remediation steps, but is alarmed to find that no patches are available to mitigate this vulnerability.

Which of the following BEST describes this exploit?

A

B.

Zero-day

49
Q

Using a heuristic system to detect an anomaly in a computer’s baseline, a system administrator was able to detect an attack even though the company signature based IDS and antivirus did not detect it. Further analysis revealed that the attacker had downloaded an executable file onto the company PC from the USB port, and executed it to trigger a privilege escalation flaw.

Which of the following attacks has MOST likely occurred?

A

B.

Zero-day

50
Q

An attacker used an undocumented and unknown application exploit to gain access to a file server.

Which of the following BEST describes this type of attack?

A

C.

Zero-day