Day 3 39-75 Flashcards
3.39 During security testing, you are attempting to flood the ARP cache of your switches using the Macof tool. What would be the result if the ARP cache is successfully flooded?
A. The switches will drop into hub mode if the ARP cache is successfully flooded.
B. If the ARP cache is flooded,the switches will drop into pix mode making it less susceptible to attacks.
C. Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.
D. The switches will route all traffic to the broadcast address created collisions.
A. The switches will drop into hub mode if the ARP cache is successfully flooded.
3.40 This TCP flag instructs the sending system to transmit all buffered data immediately.
A. SYN
B. RST
C. PSH
D. URG
E. FIN
C. PSH
3.41 A SYN Flood is a DOS attack in which an attacker deliberately violates the three-way handshake and opens a large number of half-open TCP connections. The signature of attack for SYN Flood contains:
A. The source and destination address having the same value.
B. A large number of SYN packets appearing on a network without the corresponding final reply packets.
C. The source and destination port numbers having the same value.
D. A large number of SYN packets appearing on a network with the corresponding reply packets.
B. A large number of SYN packets appearing on a network without the corresponding final reply packets.
3.42 Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?
A. Microsoft Security Baseline Analyzer
B. Retina
C. Core Impact
D. Microsoft Baseline Security Analyzer
D. Microsoft Baseline Security Analyzer
3.43 LDAP uses which port number?
A. 110
B. 389
C. 464
D. 445
B. 389
3.44 From an external IP address, you want to try and trick a switch into thinking it already has established a session with your computer. How can you accomplish this?
A. Send an IP packet with the RST/SYN bit and the source address of your computer.
B. Send an IP packet with the SYN bit and the source address of your computer.
C. Send an IP packet with the ACK bit set to zero and the source address of the switch.
D. Send an IP packet to the switch with the ACK bit and the source address of your machine.
D. Send an IP packet to the switch with the ACK bit and the source address of your machine.
3.45 To see how some of the hosts on your network react, you send out SYN packets to an IP range. A number of IPs respond with a SYN/ACK response. Before the connection is established, you send RST packets to those hosts to stop the session. You have done this to see how your intrusion detection system will log the traffic. What type of scan is this?
A. You are attempting to find live hosts on your company’s network by using an XMAS scan.
B. You are utilizing a SYN scan to find live hosts that are listening on your network.
C. This type of scan you are using is called a NULL scan.
D. You are using a half-open scan to find live hosts on your network.
D. You are using a half-open scan to find live hosts on your network.
3.46 Bob runs a Web server, IDS and firewall on his network. Recently his Web server has been under constant hacking attacks. He looks up the IDS log files and sees no intrusion attempts but the Web server constantly locks up and needs rebooting due to various brute force and buffer overflow attacks but still the IDS alerts no intrusion whatsoever. Bob becomes suspicious and views the Firewall logs and he notices huge SSL connections constantly hitting his Web server. Hackers have been using the encrypted HTTPS protocol to send exploits to the Web server and that was the reason the IDS did not detect the intrusions. How would Bob protect his network from these types of attacks?
A. Install a proxy server and terminate SSL at the proxy
B. Enable the IDS to filter encrypted HTTPS traffic
C. Install a hardware SSL “accelerator” and terminate SSL at this layer
D. Enable the Firewall to filter encrypted HTTPS traffic
A. Install a proxy server and terminate SSL at the proxy
3.47 Which port number is NTP?
A. TCP Port 124
B. UDP Port 125
C. UDP Port 123
D. TCP Port 126
C. UDP Port 123
3.48 The SNMP Read-Only Community String is like a password. The string is sent along with each SNMP Get-Request and allows (or denies) access to a device. Most network vendors ship their equipment with a default password of “public”. This is the so-called “default public community string”. How would you keep intruders from getting sensitive information regarding the network devices using SNMP? (Select 2 answers)
A. Enable SNMPv3 which encrypts username/password authentication
B. Use your company name as the public community string replacing the default ‘public’
C. Enable IP filtering to limit access to SNMP device
D. The default configuration provided by device vendors is highly secure and you don’t need to change anything
A and C
A. Enable SNMPv3 which encrypts username/password authentication
C. Enable IP filtering to limit access to SNMP device
3.49 During an Idle-Scan of a port on a target computer, an attacker receives an IPID of 24333 from a zombie. If the target’s port is closed, what will be the final response from the zombie?
A. The zombie computer will respond with an IPID of 24334.
B. The zombie computer will respond with an IPID of 24333.
C. The zombie computer will not send a response.
D. The zombie computer will respond with an IPID of 24335.
A. The zombie computer will respond with an IPID of 24334.
3.50 You want to build a web form that will ask the user for his/her credit card information. You know that the GET method is insecure as it would append the card number to the URL, and that can be cached and logged by browsers and server log files. How would you protect the credit card information from this type of data leakage?
A. Never include sensitive information in a script
B. Use HTTPS SSLv3 to send the data instead of plain HTTPS
C. Replace the GET with POST method when sending data
D. Encrypt the data before you send using GET method
C. Replace the GET with POST method when sending data
3.51 You are examining some traffic logs on a server and come across some inconsistencies. You find some IP packets from a computer purporting to be on the internal network. The packets originate from 192.168.12.35 with a TTL of 15. The server replied to this computer and received a response from 192.168.12.35 with a TTL of 21. What can you infer from this traffic log?
A. The initial traffic from 192.168.12.35 was being spoofed.
B. The traffic from 192.168.12.35 is from a Linux computer.
C. The TTL of 21 means that the client computer is on wireless.
D. The client computer at 192.168.12.35 is a zombie computer.
A. The initial traffic from 192.168.12.35 was being spoofed.
3.52 You are going to send a confidential e-mail to a client. You need to know if that client forwards the e-mail to anyone else, because that would violate the non-disclosure agreement. What can you use to accomplish this?
A. You can use a split-DNS service to ensure the email is not forwarded on.
B. A service such as HTTrack would accomplish this.
C. You could use MetaGoofil tracking tool.
D. You can use a service such as ReadNotify tracking tool.
D. You can use a service such as ReadNotify tracking tool.
3.53 You ping a target IP to check if the host is up. You do not get a response. You suspect ICMP is blocked at the firewall. Next you use hping2 tool to ping the target host and you get a response. Why does the host respond to hping2 and not ping packet?
A. Ping packets cannot bypass firewalls
B. Hping2 uses TCP instead of ICMP by default
C. Hping2 uses stealth TCP packets to connect
D. You must use ping 10.2.3.4 switch
B. Hping2 uses TCP instead of ICMP by default