Day 2 1-86 Flashcards
2.1 When dealing with a particular hashing algorithm, which property makes it less likely the algorithm will create the same hash result for multiple different source messages?
A. Collision resistance
B. Bit length
C. Key strength
D. Entropy
Answer: A Collision resistance
2.2 What does a firewall inspect to stop specific ports and programs from sending traffic in to your company?
A. Application layer port numbers and the transport layer headers
B. Network layer headers and the session layer port numbers
C. Presentation layer headers and the session layer port numbers
D. Transport layer port numbers and the application layer headers
Answer: D. Transport layer port numbers and the application layer headers
2.3 Bob has obtained a session ID from another user’s website session. Bob spoofs his IP address and re-plays the session ID trying to impersonate the other user. Why is Bob not able to get an interactive session here?
A. Bob cannot spoof his IP address over TCP network
B. The scenario is incorrect as Bob can spoof his IP and get responses
C. The server will send replies back to the spoofed IP address
D. Bob can establish an interactive session only if he uses a NAT
Answer: C. The server will send replies back to the spoofed IP address
2.4 What must you develop to show that security at your company has improved over the last year?
A. Reports
B. Testing tools
C. Metrics
D. Taxonomy of vulnerabilities
Answer: C Metrics
2.5 Which type of password attack pulls passwords from a list of commonly used passwords until the correct password is found or the list is exhausted?
A. Man-in-the-middle attack
B. Brute-force attack
C. Dictionary attack
D. Session hijacking
Answer: C. Dictionary attack
2.6 Which of these is the best solution for sending encrypted e-mails if you don’t want to have to pay any money or manage a server?
A. IP Security (IPSEC)
B. Multipurpose Internet Mail Extensions (MIME)
C. Pretty Good Privacy (PGP)
D. Hyper Text Transfer Protocol with Secure Socket Layer (HTTPS)
Answer: C Pretty Good Privacy (PGP)
2.7 How would you classify an operating-system fingerprinting method where you send traffic to the remote device and analyze the responses?
A. Passive
B. Reflective
C. Active
D. Distributive
Answer: C Active
2.8 A Certificate Authority (CA) creates a pair of keys to secure data in-transit. The integrity of the encrypted data depends on the security of which of these?
A. Public key
B. Private key
C. Modulus length
D. Email server certificate
Answer: B Private key
2.9 WiFi most commonly uses which antenna?
A. Omnidirectional
B. Parabolic
C. Uni-directional
D. Bi-directional
Answer: A Omnidirectional
2.10 Which of these PKI components actually verifies the applicant?
A. Certificate authority
B. Validation authority
C. Registration authority
D. Verification authority
Answer: C Registration authority
2.11 Which of these is the most solid example of IP spoofing?
A. SQL injections
B. Man-in-the-middle
C. Cross-site scripting
D. ARP poisoning
Answer: D ARP poisoning
2.12 Which protocol do smart-cards use to transfer certificates?
A. Extensible Authentication Protocol (EAP)
B. Point to Point Protocol (PPP)
C. Point to Point Tunneling Protocol (PPTP)
D. Layer 2 Tunneling Protocol (L2TP)
Answer: A Extensible Authentication Protocol (EAP)
2.13 Which of these programming languages is commonly vulnerable to buffer overflows?
A. Perl
B. C++
C. Python
D. Java
Answer: B . C++
2.14 Which of the following is a symmetric cryptographic standard?
A. DSA
B. PKI
C. RSA
D. 3DES
Answer: D 3DES
2.15 What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?
A. Due to the key size, the time it will take to encrypt and decrypt the message hinders efficient communication.
B. To get messaging programs to function with this algorithm requires complex configurations.
C. It has been proven to be a weak cipher, therefore, should not be trusted to protect sensitive data.
D. It is a symmetric key algorithm, meaning each recipient must receive the key through a different channel than the message.
Answer: D It is a symmetric key algorithm, meaning each recipient must receive the key through a different channel than the message.
2.16 Which of the following processes of PKI (Public Key Infrastructure) ensures that a trust relationship exists and that a certificate is still valid for specific operations?
A. Certificate issuance
B. Certificate validation
C. Certificate cryptography
D. Certificate revocation
Answer: B Certificate validation
2.17 Advanced Encryption Standard is an algorithm used for which of the following?
A. Data integrity
B. Key discovery
C. Bulk data encryption
D. Key recovery
Answer: C Bulk data encryption
2.18 While checking the settings on the internet browser, a technician finds that the proxy server settings have been checked and a computer is trying to use itself as a proxy server. What specific octet within the subnet does the technician see?
A. 10.10.10.10
B. 127.0.0.1
C. 192.168.1.1
D. 192.168.168.168
Answer: B 127.0.0.1
2.19 After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be useful to gain access to the application?
A. SHA1
B. Diffie-Helman
C. RSA
D. AES
Answer: A . SHA1
2.20 One advantage of an application-level firewall is the ability to..
A. filter packets at the network level.
B. filter specific commands, such as http:post.
C. retain state information for each packet.
D. monitor tcp handshaking.
Answer: B filter specific commands, such as http:post.
2.21 A hacker was able to sniff packets on a company’s wireless network. The following information was discovered.
The Key 10110010 01001011
The Cyphertext 01100101 01011010
Using the Exlcusive OR, what was the original message?
A. 00101000 11101110
B. 11010111 00010001
C. 00001101 10100100
D. 11110010 01011011
Answer: B 11010111 00010001
2.22 Which of the following techniques will identify if computer files have been changed?
A. Network sniffing
B. Permission sets
C. Integrity checking hashes
D. Firewall alerts
Answer: C Integrity checking hashes
2.23 Why shouldn’t we just use the longest possible key and strongest possible algorithm when selecting an encryption algorithm?
A. Overhead
B. If an algorithm such as Rijndael is chosen for AES it has been cracked and is probably useless.
C. The longest possible unbreakable key is a “one- time pad”, but the length of a message is not always known in advance, therefore the best solution is a passphrase that makes a longer key.
D. This question cannot be answered because there are so many variables and complicated factors involved and there just isn’t enough information provided.
Answer: A Overhead
2.24 How does traceroute map the route a packet travels from point A to point B?
A. Uses a TCP timestamp packet that will elicit a time exceeded in transit message
B. Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded in transit message
C. Uses a protocol that will be rejected by gateways on its way to the destination
D. Manipulates the flags within packets to force gateways into generating error messages
Answer: B Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded in transit message