CPSA MQ1 Flashcards
Why can remote access VPNs not use Main Mode for IKE Phase-1 if the authentication method is pre-shared key?
Because pre-shared key authentication with Main Mode requires that the peer’s IP is known before the connection is established.
What is the blocksize of the DES encryption cipher?
64 bits
What is this: 16:23:57.094021 IP 192.168.124.204.137 > 192.168.124.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
A NetBIOS over TCP/IP name service broadcast
Which is the least secure encryption cipher of those listed below?
DES
Which file in a user’s home directory controls the trust relationships for Berkeley R services?
rhosts
Which operating system is most likely to be vulnerable to the TTYPROMPT vulnerability in the telnet service?
Solaris 8
Which of the following algorithms could be used to negotiate a shared encryption key?
Diffie-Hellman
Why might a tester insert the string “alert(“it works”)” into a web form?
To check for a Cross-Site Scripting vulnerability
Which protocols are associated with PPTP?
TCP port 1723 and IP protocol 47
Where are the encrypted passwords stored on a Solaris system?
/etc/shadow
Which of the following statements about the rwho protocol is true?
The rwho daemon sends regular broadcasts to UDP port 513, and listens to broadcasts from other systems.
How would you establish a null session to a windows host from a windows command shell?
NET USE \hostname\ipc$ “” /u:””
If the account lockout threshold is set to 5, how many incorrect password attempts will cause the built in administrator account to be locked out on a Windows 2003 system?
The built in administrator account will never be locked out
What effect would an octal umask of 0027 have on the permissions of new files?
Remove group write access, and remove all permissions for others
What is the name given to the field concerned with the security implications of electronic eminations from communications equipment?
TEMPEST
Which of these is not a valid IPv6 address?
2001:0db8:1428:57ab
You discover an Internet accessible anonymous FTP server on a client’s internal network, which is vulnerable to the FTP bounce attack. What is the impact of this vulnerability?
Attackers could exploit the vulnerability to port scan other systems on the client’s internal network.
What would you expect the command “finger 0@hostname” (that is a zero) against a Solaris 8 system to display?
Users with an empty GCOS field in the password file.
What are the four potential risk treatments
Avoid, Reduce, Accept and Transfer
What does “export” signify for an SSL cipher
It is a weak cipher that was acceptable for export under the old US cryptography export regulations
Which of these protocols is not vulnerable to address spoofing if implemented correctly?
TCP
What effect does setting the RestrictAnonymous registry setting to 1 have on a Windows NT or 2000 system?
It prevents enumeration of SAM accounts and names.
What command would you use to list the installed packages on a Solaris system?
pkginfo
Which protocols and ports are used by Telnet, SMTP and Finger?
TCP/23, TCP/25 and TCP/79.
What would an SNMP request to set OID 1.3.6.1.4.1.9.2.1.55.10.0.0.1 to “file” on a Cisco router using a community string with read/write access do?
Cause the target router to upload its configuration file to the TFTP server at 10.0.0.1 as a file called “file”.
What RPC authentication mechanism does NFS v2 and v3 use?
AUTH_SYS, using Unix UID and GID
Which of these statements about the Windows built in administrator account is correct?
It always has RID 500
What does the “Root Squash” option on an NFS export do?
Makes the root user on the NFS client access files as nobody on the server
With blind SQL injection, the results of the injection are not visible, and no errors are displayed. How can blind SQL injection be detected?
The web server behaviour changes when a successful injection is performed.
What does the phrase “Inherent Risk” mean in risk management?
A risk that is implicitly associated with an activity or location.
Which of the following cipher modes use a block cipher to generate a key stream that can be used as a stream cipher?
CFB
What is the digest length for the SHA1 hash function?
160 bits
What is the default password for the DBSNMP user on Oracle 9i?
DBSNMP
Which of these groups of tools are commonly used for packet crafting?
hping2, hping3 and scapy
The active directory database file is:
NTDS.DIT
Which nmap flag enables OS TCP/IP stack fingerprinting?
-O