Day 4 115-151 Flashcards
4.115 Which tool could let you view wireless traffic going to and from your WAP?
A. Nessus
B. Wireshark
C. Netcat
D. Netstat
B. Wireshark
4.116 Wireshark uses which format as the default view for data in the currently selected packet?
A. ASCII
B. Binary
C. Decimal
D. Hexadecimal
D. Hexadecimal
4.117 Replace the * in this command by viewing the command and the corresponding output:
Ping -* 7 192.168.5.10
Pinging 192.168.5.10 with 32 bytes of data:
Reply from 192.168.5.10: bytes=32 time<1ms TTL=64
Reply from 192.168.5.10: bytes=32 time<1ms TTL=64
Reply from 192.168.5.10: bytes=32 time<1ms TTL=64
Reply from 192.168.5.10: bytes=32 time<1ms TTL=64
Reply from 192.168.5.10: bytes=32 time<1ms TTL=64
Reply from 192.168.5.10: bytes=32 time<1ms TTL=64
Reply from 192.168.5.10: bytes=32 time<1ms TTL=64
Ping statistics for 192.168.5.10:
Packets: Sent = 7, Received = 7, Lost = 0 (0% loss)
A. t
B. n
C. s
D. a
B. n
Ping –n 7 192.168.5.10 means to send 7 echo requests to 192.168.5.10. In Windows, the default is to send 4 requests, but with the –n (number) switch, you can specify exactly how many to send (in this case, 7 requests).
4.118 You get a security alert and you need to analyze a public IP address listed in the alert. Which of these would be the LEAST important information to review?
A. ARP
B. Whois
C. DNS
D. Geolocation
A. ARP
Whois will tell you who registered the domain. DNS could tell you the FQDN and other important information about the IP address. Geolocation would tell you where the IP is located. ARP is a mapping of IP address to MAC address, but this really wouldn’t be relevant to public IP’s out on the internet, and wouldn’t give you any useful information here.
4.119 Which list of activities would give you the most information about a system’s security posture?
A. Social engineering, company website browsing, tailgating
B. Phishing, spamming, sending trojans
C. Port scanning, banner grabbing, service identification
D. Wardriving warchalking, social engineering
C. Port scanning, banner grabbing, service identification
4.120 Which type of system could generate an alert when any computer sends “many” packets based on the typical number of packets sent by all your computers, and using some defined threshold values?
A. A behavior-based IDS
B. A hybrid IDS
C. A signature-based IDS
D. Just a network monitoring tool
A. A behavior-based IDS
4.121 What’s the BEST reason to implement a DMZ on your network?
A. To contain the network devices you want to protect
B. To provide a place to put the honeypot
C. To only provide direct access to nodes within the DMZ and protect the network behind it
D. To scan all traffic coming through the DMZ to the internal network
C. To only provide direct access to nodes within the DMZ and protect the network behind it
4.122 Which type of test is it where the tester has only partial knowledge of the system he/she’s testing?
A. White-box
B. Grey-box
C. Black-box
D. Announced
B. Grey-box
4.123 You encrypt your data with your public key, then copy the data to a commercial cloud-based storage solution. Which of these scenarios would compromise the privacy of your data?
A. A hacker compromises the cloud server and steals the encrypted data.
B. The FBI forces you to give them your private key, however, since they have no warrant, the cloud service provider refuses to give the FBI access to the stored data.
C. You also store your private key on the cloud server, and an attacker has gained access to the server.
D. None of these scenarios would compromise the privacy of your data.
C. You also store your private key on the cloud server, and an attacker has gained access to the server.
4.124 All of these are PCI compliance recommendations EXCEPT for which?
A. Use a firewall between the public network and the payment card data.
B. Limit access to card holder data to as few employees as possible.
C. Use encryption to protect all transmission of card holder data over any public network.
D. Rotate employees handling credit card transactions on a yearly basis to different departments.
D. Rotate employees handling credit card transactions on a yearly basis to different departments.
4.125 Which keys are shared to enable the process of encryption and decryption of data?
A. User passwords
B. Public and private keys
C. Public keys
D. Private keys
C. Public keys
4.126 What’s it called when a company employs multiple layers of security controls in order to improve its security posture?
A. Security through obscurity
B. Defense in depth
C. Host-based intrusion detection
D. Network-based intrusion detection
B. Defense in depth
4.127 Which password cracking technique is the slowest?
A. Dictionary attack
B. Shoulder surfing
C. Brute force
D. Rainbow tables
C. Brute force
4.128 Which of these is the best way to evade a NIDS?
A. Out of band signaling
B. Protocol isolation
C. Alternate Data Streams
D. Encryption
D. Encryption
4.129 There are many different types of security policies. For example, there are Network Security Policies, Remote Access Policies, User Account Policies, Information Security Policies, etc. What is the main theme of these policies?
A. Confidentiality, Integrity, Availability
B. Authenticity, Confidentiality, Integrity
C. Availability, Non-repudiation, Confidentiality
D. Authenticity, Integrity, Non-repudiation
A. Confidentiality, Integrity, Availability