Day 3 115-151 Flashcards
3.115 You want to use Metasploit to exploit a server and then pivot to a LAN. How would you pivot using Metasploit?
A. Issue the pivot exploit and set the meterpreter.
B. Reconfigure the network settings in the meterpreter.
C. Set the payload to propagate through the meterpreter.
D. Create a route statement in the meterpreter.
D. Create a route statement in the meterpreter.
3.116 Which is the best way to find vulnerabilities on a Windows-based computer?
A. Check MITRE.org for the latest list of CVE findings
B. Use the built-in Windows Update tool
C. Create a disk image of a clean Windows installation
D. Use a scan tool like Nessus
D. Use a scan tool like Nessus
3.117 What is one thing a tester can do to ensure that the software is trusted and is not changing or tampering with critical data on the back end of a system it is loaded on?
A. System security and architecture review
B. Secure coding principles
C. Proper testing
D. Analysis of interrupts within the software
C. Proper testing
3.118 Which method can provide a better return on IT security investment and provide a thorough and comprehensive assessment of organizational security covering policy, procedure design, and implementation?
A. Vulnerability scanning
B. Access control list reviews
C. Penetration testing
D. Social engineering
C. Penetration testing
3.119 A computer technician is using a new version of a word-processing software package when it is discovered that a special sequence of characters causes the entire computer to crash. The technician researches the bug and discovers that no one else experienced the problem. What is the appropriate next step?
A. Notify the vendor of the bug and do not disclose it until the vendor gets a chance to issue a fix
B. Find an underground bulletin board and attempt to sell the book to the highest bidder
C. Create a document that will crash the computer when opened and send it to friends
D. Ignore the problem completely and let someone else deal with it
A. Notify the vendor of the bug and do not disclose it until the vendor gets a chance to issue a fix
3.120 Which cipher encrypts the plaintext digit (bit or byte) one by one?
A. Classical cipher
B. Block cipher
C. Modern cipher
D. Stream cipher
D. Stream cipher
Stream ciphers encrypt data one bit or byte at a time as the data is being sent. A block cipher grabs one large block of data, encrypts it, sends it, then grabs the next block and so on.
3.121 Fire walk (firewall probing) has just completed the second phase (the scanning phase) and a technician receives the output shown below. What conclusions can be drawn based on the scan results?
TCP port 21 – no response
TCP port 22 – no response
TCP ports 23 – time to live exceeded
A. The lack of response from port 21 and 22 indicate that those services are not running on the destination server
B. The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host
C. The scan port on 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error
D. The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall
D. The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall
3.122 WPA2 uses AES for wireless data encryption at which of the following encryption levels?
A. 128 bit and TKIP
B. 64 bit and CCMP
C. 128 bit and CRC
D. 128 bit and CCMP
D. 128 bit and CCMP
3.123 How can you exploit MS SQL 2000 that is running under a Local System account with the default credentials?
A. Using the Metasploit psexec module setting the SA / Admin credential B. Invoking the stored procedure xp_shell to spawn a Windows command shell C. Invoking the stored procedure cmd_shell to spawn a Windows command shell D. Invoking the stored procedure xp_cmdshell to spawn a Windows command shell
D. Invoking the stored procedure xp_cmdshell to spawn a Windows command shell
3.124 Which type of scan measures a person’s external features through a digital video camera?
A. Facial recognition scan
B. Signature kinetics scan
C. Iris scan
D. Retinal scan
A. Facial recognition scan
3.125 You are concerned that the existing security controls have not been designed properly. Currently, the administrator is responsible for approving and issuing proximity card access to the server room, as well as reviewing the electronic access logs on a weekly basis.
Which of the following is an issue with the situation?
A. Undue influence
B. Lack of experience
C. Segregation of duties
D. Inadequate disaster recovery plan
C. Segregation of duties
3.126 An NMAP scan of a server shows port 69 is open. What risk could this pose?
A. Cleartext login
B. Weak SSL version
C. Web portal data leak
D. Unauthenticated access
D. Unauthenticated access
Port 69 is for TFTP (the UDP version of FTP). TFTP lacks any form of security and allows anyone access to upload and download files.
3.127 Which security control role does encryption meet?
A. Preventative
B. Defensive
C. Detective
D. Offensive
A. Preventative
3.128 You run daily Nessus scans on your internal network as part of your vulnerability management program. In your DMZ you have web, mail, and DNS servers, but you think that your firewall may be blocking Nessus from scanning the servers in the DMZ. Which of these solutions would give Nessus the same “visibility” of the DMZ as that of the outside world?
A. Run Nessus from a server that resides in the DMZ so that no firewalls, IPS, or other security products interfere with the scan.
B. Have the firewall rules modified so that the Nessus server on the internal network is able to scan the hosts in the DMZ.
C. Run Nessus from a location on the internet which is separate from the company’s network so that no firewalls, IPS, or other security products interfere with the scan.
D. Leave the Nessus server in the internal network but add a second network card so that it can be connected to a switch in the DMZ. This will allow the Nessus server to have access to the internal and DMZ networks.
B. Have the firewall rules modified so that the Nessus server on the internal network is able to scan the hosts in the DMZ.
3.129 Hacker Joe gains access to your DNS server and redirects queries for www.amazon.com to his own IP address. Now when your employees try to visit Amazon’s website they are redirected to Hacker Joe’s machine. What is the name for this attack?
A. ARP poisoning
B. Smurf attack
C. MAC flooding
D. DNS spoofing
D. DNS spoofing