Day 1 76-114 Flashcards
1.76 Which THREE of these are used for password cracking?
A. BTCrack B. John the Ripper C. KerbCrack D. Nikto E. Cain and Abel F. Havij
Answer: B,C,E
1.77 On a Windows machine, what is the RID/SID of the administrator account?
A. 100
B. 412
C. 500
D. 999
Answer: C
1.78 Hacker Joe attacks a web page by entering unexpected data on the logon page. He then gains access to the database and displays the contents of the table that has usernames and passwords of other users. What is the problem here?
A. Insufficient security management
B. Insufficient exception handling
C. Insufficient database hardening
D. Insufficient input validation
Answer: D
1.79 Which of these is a set of rules for people who handle electronic medical data?
A. FISMA
B. COBIT
C. HIPAA
D. ISO/IEC 27002
Answer: C
1.80 You boot your computer up to find a pop-up message saying that illegal activity was detected, and your computer is now locked. The message also states that you must pay a fine to have your computer unlocked. You find that you cannot bypass this message and you are unable to use your computer at all. Which of these threats is this describing?
A. Riskware
B. Spyware
C. Adware
D. Ransomware
Answer: D
1.81 While you are logged in to your bank using your web browser, you get an e-mail with a link to another website. You click the link and go to the second site where you see some funny videos. The next day, your bank sends you an e-mail saying your account has been accessed from China, and funds have been transferred there. Which of these web vulnerabilities was exploited to steal your funds?
A. Web form input validation
B. Clickjacking
C. Cross-Site Scripting
D. Cross Site Request Forgery
Answer: D
1.82 The chance of a hard drive failure is once every four years. The cost to buy a new hard drive is $400. It will require 5 hours to restore the OS and software to the new hard disk. It will require another 5 hours to restore the user data from the last backup to the new hard disk. The recovery tech earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1 (100%).
What is the closest approximate cost of this replacement and recovery operation per year?
A. $100
B. $125
C. $500
D. $1500
Answer: B
1.83 An attacker wants to target your company with malware, so he compromises a web site your employees frequently visit. He hopes your users’ machines will become infected with the malware. Which type of attack is this?
A. Spear Phishing attack
B. Watering Hole attack
C. Heartbleed attack
D. Shellshock attack
Answer: B
1.84 What is the process called that can record, log, and resolve events that happen in your company?
A. Metrics
B. Incident management process
C. Internal procedure
D. Security policy
Answer: B
1.85 While doing a pen-test, you send the boss’s secretary an e-mail, changing the source to look like it came from the boss. You ask her for some links to relevant websites. She sends you the links via e-mail. You change them to links containing malware and send them back, telling her the links didn’t work. She tries the links herself and her machine gets infected, giving you access to it. Which testing method was used?
A. Piggybacking
B. Social engineering
C. Tailgating
D. Eavesdropping
Answer: B
1.86 Which of the following describes a LM Hash:I - The maximum password length is 14 characters.II - There are no distinctions between uppercase and lowercase.III - It’s a simple algorithm, so 10,000,000 hashes can be generated per second.
A. I
B. II
C. I and II
D. I, II, and III
Answer: D
1.87 In which phase of incident-handling do you define processes/procedures/rules, and create and test back-up and response plans?
A. Preparation phase
B. Identification phase
C. Containment phase
D. Recovery phase
Answer: A
1.88 Which technique provides ‘security through obscurity‘ by hiding secret messages within ordinary messages?
A. Encryption
B. RSA algorithm
C. Steganography
D. Public-Key cryptography
Answer: C
1.89 While doing a pen-test, you find a hidden folder with the admin’s bank account username and password information. What should you do?
A. Do not report it and continue the penetration test
B. Report immediately to the administrator
C. Transfer money from the administrator’s account to another account
D. Do not transfer the money but steal the bitcoins
Answer: B
1.90 Risks = threats x vulnerabilities x impact is referred to as the:
A. Risk equation
B. Threat assessment
C. Disaster recovery formula
D. BIA equation
Answer: A