Day 2 1-86 Flashcards
2.1 When dealing with a particular hashing algorithm, which property makes it less likely the algorithm will create the same hash result for multiple different source messages?
A. Collision resistance
B. Bit length
C. Key strength
D. Entropy
Answer: A Collision resistance
2.2 What does a firewall inspect to stop specific ports and programs from sending traffic in to your company?
A. Application layer port numbers and the transport layer headers
B. Network layer headers and the session layer port numbers
C. Presentation layer headers and the session layer port numbers
D. Transport layer port numbers and the application layer headers
Answer: D. Transport layer port numbers and the application layer headers
2.3 Bob has obtained a session ID from another user’s website session. Bob spoofs his IP address and re-plays the session ID trying to impersonate the other user. Why is Bob not able to get an interactive session here?
A. Bob cannot spoof his IP address over TCP network
B. The scenario is incorrect as Bob can spoof his IP and get responses
C. The server will send replies back to the spoofed IP address
D. Bob can establish an interactive session only if he uses a NAT
Answer: C. The server will send replies back to the spoofed IP address
2.4 What must you develop to show that security at your company has improved over the last year?
A. Reports
B. Testing tools
C. Metrics
D. Taxonomy of vulnerabilities
Answer: C Metrics
2.5 Which type of password attack pulls passwords from a list of commonly used passwords until the correct password is found or the list is exhausted?
A. Man-in-the-middle attack
B. Brute-force attack
C. Dictionary attack
D. Session hijacking
Answer: C. Dictionary attack
2.6 Which of these is the best solution for sending encrypted e-mails if you don’t want to have to pay any money or manage a server?
A. IP Security (IPSEC)
B. Multipurpose Internet Mail Extensions (MIME)
C. Pretty Good Privacy (PGP)
D. Hyper Text Transfer Protocol with Secure Socket Layer (HTTPS)
Answer: C Pretty Good Privacy (PGP)
2.7 How would you classify an operating-system fingerprinting method where you send traffic to the remote device and analyze the responses?
A. Passive
B. Reflective
C. Active
D. Distributive
Answer: C Active
2.8 A Certificate Authority (CA) creates a pair of keys to secure data in-transit. The integrity of the encrypted data depends on the security of which of these?
A. Public key
B. Private key
C. Modulus length
D. Email server certificate
Answer: B Private key
2.9 WiFi most commonly uses which antenna?
A. Omnidirectional
B. Parabolic
C. Uni-directional
D. Bi-directional
Answer: A Omnidirectional
2.10 Which of these PKI components actually verifies the applicant?
A. Certificate authority
B. Validation authority
C. Registration authority
D. Verification authority
Answer: C Registration authority
2.11 Which of these is the most solid example of IP spoofing?
A. SQL injections
B. Man-in-the-middle
C. Cross-site scripting
D. ARP poisoning
Answer: D ARP poisoning
2.12 Which protocol do smart-cards use to transfer certificates?
A. Extensible Authentication Protocol (EAP)
B. Point to Point Protocol (PPP)
C. Point to Point Tunneling Protocol (PPTP)
D. Layer 2 Tunneling Protocol (L2TP)
Answer: A Extensible Authentication Protocol (EAP)
2.13 Which of these programming languages is commonly vulnerable to buffer overflows?
A. Perl
B. C++
C. Python
D. Java
Answer: B . C++
2.14 Which of the following is a symmetric cryptographic standard?
A. DSA
B. PKI
C. RSA
D. 3DES
Answer: D 3DES
2.15 What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?
A. Due to the key size, the time it will take to encrypt and decrypt the message hinders efficient communication.
B. To get messaging programs to function with this algorithm requires complex configurations.
C. It has been proven to be a weak cipher, therefore, should not be trusted to protect sensitive data.
D. It is a symmetric key algorithm, meaning each recipient must receive the key through a different channel than the message.
Answer: D It is a symmetric key algorithm, meaning each recipient must receive the key through a different channel than the message.
2.16 Which of the following processes of PKI (Public Key Infrastructure) ensures that a trust relationship exists and that a certificate is still valid for specific operations?
A. Certificate issuance
B. Certificate validation
C. Certificate cryptography
D. Certificate revocation
Answer: B Certificate validation
2.17 Advanced Encryption Standard is an algorithm used for which of the following?
A. Data integrity
B. Key discovery
C. Bulk data encryption
D. Key recovery
Answer: C Bulk data encryption
2.18 While checking the settings on the internet browser, a technician finds that the proxy server settings have been checked and a computer is trying to use itself as a proxy server. What specific octet within the subnet does the technician see?
A. 10.10.10.10
B. 127.0.0.1
C. 192.168.1.1
D. 192.168.168.168
Answer: B 127.0.0.1
2.19 After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be useful to gain access to the application?
A. SHA1
B. Diffie-Helman
C. RSA
D. AES
Answer: A . SHA1
2.20 One advantage of an application-level firewall is the ability to..
A. filter packets at the network level.
B. filter specific commands, such as http:post.
C. retain state information for each packet.
D. monitor tcp handshaking.
Answer: B filter specific commands, such as http:post.
2.21 A hacker was able to sniff packets on a company’s wireless network. The following information was discovered.
The Key 10110010 01001011
The Cyphertext 01100101 01011010
Using the Exlcusive OR, what was the original message?
A. 00101000 11101110
B. 11010111 00010001
C. 00001101 10100100
D. 11110010 01011011
Answer: B 11010111 00010001
2.22 Which of the following techniques will identify if computer files have been changed?
A. Network sniffing
B. Permission sets
C. Integrity checking hashes
D. Firewall alerts
Answer: C Integrity checking hashes
2.23 Why shouldn’t we just use the longest possible key and strongest possible algorithm when selecting an encryption algorithm?
A. Overhead
B. If an algorithm such as Rijndael is chosen for AES it has been cracked and is probably useless.
C. The longest possible unbreakable key is a “one- time pad”, but the length of a message is not always known in advance, therefore the best solution is a passphrase that makes a longer key.
D. This question cannot be answered because there are so many variables and complicated factors involved and there just isn’t enough information provided.
Answer: A Overhead
2.24 How does traceroute map the route a packet travels from point A to point B?
A. Uses a TCP timestamp packet that will elicit a time exceeded in transit message
B. Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded in transit message
C. Uses a protocol that will be rejected by gateways on its way to the destination
D. Manipulates the flags within packets to force gateways into generating error messages
Answer: B Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded in transit message
2.25 Which of the following countermeasures can specifically protect against both the MAC Flood and MAC Spoofing attacks?
A. Configure Port Security on the switch
B. Configure Port Recon on the switch
C. Configure Switch Mapping
D. Configure Multiple Recognition on the switch
Answer: A Configure Port Security on the switch
2.26 What does ICMP (type 11, code 0) denote?
A. Source Quench
B. Destination Unreachable
C. Time Exceeded
D. Unknown Type
Answer: C Time Exceeded
2.27 How do you defend against DHCP Starvation attack?
A. Enable ARP-Block on the switch
B. Enable DHCP snooping on the switch
C. Configure DHCP-BLOCK to 1 on the switch
D. Install DHCP filters on the switch to block this attack
Answer: B Enable DHCP snooping on the switch
2.28 Neil is a network administrator working in Istanbul. Neil wants to setup a protocol analyzer on his network that will receive a copy of every packet that passes through the main office switch. What type of port will Neil need to setup in order to accomplish this?
A. Neil will have to configure a Bridged port that will copy all packets to the protocol analyzer.
B. Neil will need to setup SPAN port that will copy all network traffic to the protocol analyzer.
C. He will have to setup an Ether channel port to get a copy of all network traffic to the analyzer.
D. He should setup a MODS port which will copy all network traffic.
Answer: B Neil will need to setup SPAN port that will copy all network traffic to the protocol analyzer.
2.29 Attackers footprint target Websites using Google Hacking techniques. (creating complex search string queries) The configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. WordPress uses config.php that stores the database Username and Password.
Which of the below Google search string brings up sites with “config.php” files?
A. Search:index config/php
B. Wordpress:index config.php
C. intitle:index.of config.php
D. Config.php:index list
Answer: C intitle:index.of config.php
2.30 Which of the following Exclusive OR transforms bits is NOT correct?
A. 0 xor 0 = 0
B. 1 xor 0 = 1
C. 1 xor 1 = 1
D. 0 xor 1 = 1
Answer: C 1 xor 1 = 1
2.31 What is a successful method for protecting a router from potential smurf attacks?
A. Placing the router in broadcast mode
B. Enabling port forwarding on the router
C. Installing the router outside of the network’s firewall
D. Disabling the router from accepting broadcast ping messages
Answer: D Disabling the router from accepting broadcast ping messages
2.32 How do you defend against ARP Spoofing? Select three.
A. Use ARPWALL system and block ARP spoofing attacks
B. Tune IDS Sensors to look for large amount of ARP traffic on local subnets
C. Use private VLANS
D. Place static ARP entries on servers, workstations, and routers
Answer: A, C, D
A. Use ARPWALL system and block ARP spoofing attacks
C. Use private VLANS
D. Place static ARP entries on servers, workstations, and routers
2.33 Which of the following statements about vulnerability scanners is NOT correct?
A. Vulnerability scanners attempt to identify vulnerabilities in the hosts scanned.
B. Vulnerability scanners can help identify out-of-date software versions, missing patches, or system upgrades
C. They can validate compliance with or deviations from the organization’s security policy
D. Vulnerability scanners can identify weakness and automatically fix and patch the vulnerabilities without user intervention
Answer: D Vulnerability scanners can identify weakness and automatically fix and patch the vulnerabilities without user intervention
2.34 How can you prevent MAC spoofing and/or ARP poisoning on all the Cisco switches in your network?
A. Use the command ip binding set.
B. Use the command no ip spoofing.
C. Use the command no dhcp spoofing.
D. Use the command ip dhcp snooping binding.
Answer: D Use the command ip dhcp snooping binding.