Exam Prep Flashcards
What is the notion among hackers that something is worth doing or is interesting?
A) Zero-Day
B) Doxing
C) Hack Value
D)Exploit
C) Hack Value
What is an existence of a weakness,design, or implementation error that may lead to compromising the security of the system?
A) Exploit
B) Payload
C) Vulnerability
D) Bot
C) Vulnerability
What is breach of IT system security through vulnerabilities?
A) Doxing
B) Daisy Chaining
C) Exploit
D) Payload
C) Exploit
What is a part of an exploit code that performs the malicious action? i.e. destroying, creating, backdoor, hijacking computers
A) Vulnerability
B) Bot
C) Hack Value
D) Payload
D) Payload
What is an attack that exploits computer application vulnerabilities before a patch was able to be released?
A) Bot
B) Daisy Chaning
C) Zero-Day Attack
D) Hack Value
C) Zero-Day Attack
What involves gaining access to one network and/or computer to obtain information that will enable them to gain access to multiple other computers and/or networks?
A) Bot
B) Exploit
C) Daisy Chaining
D) Payload
C) Daisy Chaining
What involves publishing personally identifiable information about an individual that was obtain from public databases and social media?
A) Doxing
B) Zero-Day Attack
C) Vulnerability
D) Daisy Chaining
A) Doxing
What is a software application that can be remotely controlled to execute/automate predefined tasks?
A) Bot
B) Payload
C) Hack Value
D) Doxing
A) Bot
What is a state of infrastructure and information well-being to keep the possibility of theft, tampering, disruption of information and services kept tolerable and low?
A) Confidentiality
B) Information Security
C) Authenticity
D) Integrity
B) Information Security
What is the assurance that information is only accessible to authorized individuals?
A) Authenticity
B) Availability
C) Integrity
D)Confidentiality
D) Confidentiality
What is the trustworthiness of preventing improper and unauthorized changes of data or resources?
A) Availability
B) Integrity
C) Information Security
D) Non-Repudiation
B) Integrity
What refers to the assurance that the system which is responsible for the processing, delivering and storing of information is accessible to the authorized users when required?
A) Availability
B) Authenticity
C) Confidentiality
D) Non-Repudiation
A) Availability
What refers to any data, communication or document characteristics which ensures the quality of being genuine?
A) Availability
B) Authenticity
C) Non-Repudiation
D)Confidentiality
B) Authenticity
What guarantees that an individual cannot later deny sending a message and the recipient cannot deny receiving a message?
A) Availability
B) Non-Repudiation
C) Authenticity
D) Confidentiality
B) Non-Repudiation
What three components can any systems level of security be defined by?
A) Authenticity, Confidentiality, Integrity
B) Security, Functionality, Usability
C) Non-Repudiation, Usability, Authenticity
D) Authenticity, Integrity, Security
B) Security, Functionality, Usability
What three components make up attacks?
A) Attacks = Motive (goal) + Method + Vulnerability
B) Attacks = Security + Method + Confidentiality
C) Attacks = Availability + Vulnerability + Motive
D) Attacks = Security + Integrity + Method
A) Attacks = Motive (goal) + Method + Vulnerability
What originates out of the awareness that a target system processes or stores valuable data, which may lead towards an attack on the system?
A) Method
B) Vulnerability
C) Attackers
D) Motive
D) Motive
Who utilizes a variety of different tools and attack techniques to exploit vulnerabilities within a computer system to accomplish their motives?
A) System Analysts
B) Attackers
C) White Hat
D) All of the above
B) Attackers
What is an on-demand delivery of IT capabilities where an organizations sensitive data and clients are stored?
A) Cloud Computing
B) Botnet
C) Workstation
D) Access Control
A) Cloud Computing
What attack vector is a flaw in within a client’s application cloud which can enable attackers to access other client’s data?
A) Mobile Threats
B) Ransomware
C) Advanced Persistent Threats
D) Cloud Computing Threats
D) Cloud Computing Threats
What attack vector focuses on stealing data from a victims machine without their knowledge?
A) Advanced Persistent Threats (APT)
B) Ransomware
C) Mobile Threats
D) Cloud Computing Threats
A) Advanced Persistent Threats (APT)
What is the most prevalent networking threat that is capable of infecting an entire network within seconds?
A) Mobile Threats
B) Viruses and Worms
C) Advanced Persistent Threats
D) Cloud Computing Threats
B) Viruses and Worms
What attack restricts access to files and folders within a computer system and demands an online payment to remove the restrictions?
A) Advanced Persistent Threats (APT)
B) Ransomware
C) Mobile Threats
D) Cloud Computing Threats
B) Ransomware
Why have the focus of attackers shifted towards mobile devices?
A) The increase of mobile device adoption for business and personal purposes, and it also has less security controls.
B) No security controls
C) Individuals do not use mobile devices often
D) All of the above
A) The increase of mobile device adoption for business and personal purposes, and it also has less security controls.
What is a huge network of compromised systems that are utilized by attackers to perform a variety of different network attacks.
A) Insider Attacks
B) IoT Threats
C) Phishing
D) Botnet
D) Botnet
What attack is performed on a network or single computer by an entrusted individual who has authorized access?
A) Insider Attacks
B) IoT Threats
C) Phishing
D) Botnet
A) Insider Attacks
What attack send an illegitimate email claiming to be a legitimate site in as an attempt to acquire a users personal /account information?
A) Insider Attacks
B) IoT Threats
C) Phishing
D) Botnet
C) Phishing
Which security attack vector threatens the performance of a website and hampers its security to steal user credentials, set up a phishing site or acquire private data by targeting web applications?
A) Insider Attacks
B) Web Application Threats
C) Phishing
D) Botnet
B) Web Application Threats
What enables attackers to remotely gain access into an IoT device in order to perform a variety of different attacks?
A) Insider Attacks
B) IoT Threats
C) Phishing
D) Botnet
B) IoT Threats
What are the three different Information Security Threat Categories?
A) Network Threats, Host Threats, Application Threats
B) Host Threats, IoT Threats, Web Application Threats
C) Mobile Threats, Network Threats, IoT threats
D) Security Threats, Confidentiality Threats, IoT Threats
A) Network Threats, Host Threats, Application Threats
What type of attack does an attacker search for OS vulnerabilities and exploits them to gain access to the system?
A) Misconfiguration Attacks
B) Operating System Attacks
C) Shrink Wrap Code Attacks
D) Application Level Attacks
B) Operating System Attacks
What type of attack affects the web servers, application platforms, databases, networks, or frameworks that can lead towards illegal access or even the possibility of owning the system?
A) Misconfiguration Attacks
B) Operating System Attacks
C) Shrink Wrap Code Attacks
D) Application Level Attacks
A) Misconfiguration Attacks
What type of attack exploits that vulnerabilities in applications that are running on a company’s information system in order to steal or manipulate the data or gain unauthorized access?
A) Misconfiguration Attacks
B) Operating System Attacks
C) Shrink Wrap Code Attacks
D) Application Level Attacks
D) Application Level Attacks
What type of attack will exploit default configurations and settings of off- the-shelf libraries and code?
A) Misconfiguration Attacks
B) Operating System Attacks
C) Shrink Wrap Code Attacks
D) Application Level Attacks
C) Shrink Wrap Code Attacks
What refers to the utilization of information and communication technologies (ICT) for a competitive advantage over an opponent?
A) Information Warfare (InfoWar)
B) Vulnerability Warfare
C) Attacker Warfare
D) Exploit Warfare
A) Information Warfare (InfoWar)
What refers to all of the strategies/actions used to to defend against ICT asset attacks?
A) Defensive Information Warfare
B) Offensive Information Warfare
C) Attacker Warfare
A) Defensive Information Warfare
What refers to information warfare which involves the attacks against the opponents ICT assets?
A) Defensive Information Warfare
B) Offensive Information Warfare
C) Attacker Warfare
B) Offensive Information Warfare
What refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized access to a system?
A) Hacking
B) Analysis
C) Vulnerability
D) Authorized User
A) Hacking
Who are people with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers?
A) Black Hats
B) Script Kiddies
C) White Hats
D) Gray Hats
A) Black Hats
Who are unskilled hackers who compromise systems by running scripts, tools, and software developed by real hackers?
A) Black Hats
B) Script Kiddies
C) White Hats
D) Gray Hats
B) Script Kiddies
Who are people who profess hacking skills and utilize them for defensive proposes and are also known as security analysts?
A) Black Hats
B) Script Kiddies
C) White Hats
D) Gray Hats
C) White Hats
Who are people that have a wide range of skills, motivated by religious or political beliefs to create fear by large-scale disruption of computer networks?
A) Black Hats
B) Script Kiddies
C) Cyber Terrorists
D) Gray Hats
C) Cyber Terrorists
Who are individuals that work both offensively and defensively at various items?
A) Gray Hats
B) Script Kiddies
C) Cyber Terrorists
D) Gray Hats
A) Gray Hats
Who are people that are employed by the government to penetrate and gain top - secret information and to damage information systems of the other governments?
A) Gray Hats
B) Script Kiddies
C) State Sponsored Hackers
D) Gray Hats
C) State Sponsored Hackers
Who are people who aim to bring down critical infrastructure for a “cause” and are not worried about facing jail time or punishment?
A) Gray Hats
B) Script Kiddies
C) State Sponsored Hackers
D) Suicide Hackers
D) Suicide Hackers
Who are individuals who promote a political agenda by hacking especially by defacing or disabling websites?
A) Gray Hats
B) Hacktivist
C) State Sponsored Hackers
D) Suicide Hackers
B) Hacktivist
What is the second hacking phase?
A) Reconnaissance B) Scanning C) Gaining access D) Maintaining access E) Clearing tracks
B) Scanning
What is the third hacking phase?
A) Reconnaissance B) Scanning C) Gaining access D) Maintaining access E) Clearing tracks
C) Gaining access
What is the fourth hacking phase?
A) Reconnaissance B) Scanning C) Gaining access D) Maintaining access E) Clearing tracks
D) Maintaining access
What is the last hacking phase?
A) Reconnaissance B) Scanning C) Gaining access D) Maintaining access E) Clearing tracks
E) Clearing tracks
What is the first hacking phase?
A) Reconnaissance B) Scanning C) Gaining access D) Maintaining access E) Clearing tracks
A) Reconnaissance
What refers to the preparatory phase where an attacker seeks to gather information about a target prior to launching an attack?
A) Scanning B) Reconnaissance C) Gaining Access D) Maintaining Access E) Clearing tracks
B) Reconnaissance
What refers to the pre-attack phase when the attacker scans the network for specific information.
A) Scanning B) Reconnaissance C) Gaining Access D) Maintaining Access E) Clearing tracks
A) Scanning
What refers to the point where the attacker obtains access to the operating system or application?
A) Scanning B) Reconnaissance C) Gaining Access D) Maintaining Access E) Clearing tracks
C) Gaining Access
What refers to the phase when the attacker tries to retain his or her ownership of the system?
A) Scanning B) Reconnaissance C) Gaining Access D) Maintaining Access E) Clearing tracks
D) Maintaining Access
What refers to the activities carried out by an attacker to hide malicious acts?
A) Scanning B) Reconnaissance C) Gaining Access D) Maintaining Access E) Clearing tracks
E) Clearing tracks
What involves the use of hacking tools , tricks, and technical techniques to identify vulnerabilities to ensure system security?
A) Ethical Hacking
B) Hacking
C) Scanning
D) Reconnaissance
A) Ethical Hacking
What refers to the assurance that the integrity, availability, confidentiality and authenticity of information and information systems are protected during usage, processing, storage, and transmission of information?
A) Information Assurance (AI)
B) Hacking
C) Ethical Hacking
D) Scanning
A) Information Assurance (AI)
What is a well-defined level of information security that includes policies, processes, procedures, standards and guidelines?
A) Information Security Management Program
B) Enterprise Information Security Architecture (EISA)
C) Network Security Zoning
D) Defense-In-Depth
A) Information Security Management Program
What is a set of requirements,processes,principles and models that determines the structure and behavior of an organization’s information systems?
A) Information Security Management Program
B) Enterprise Information Security Architecture (EISA)
C) Network Security Zoning
D) Defense-In-Depth
B) Enterprise Information Security Architecture (EISA)
What mechanism allows an organization to manage a secure network environment by selecting the appropriate security levels for the different zones of internet and intranet networks?
A) Information Security Management Program
B) Enterprise Information Security Architecture (EISA)
C) Network Security Zoning
D) Defense-In-Depth
C) Network Security Zoning
What is an uncontrolled zone, as it is outside the boundaries of an organization?
A) Internet DMZ B) Internet Zone C) Production Network Zone D) Intranet Zone E) Management Network Zone
B) Internet Zone
What is a controlled zone, as it provides a barrier between internal networks and internet?
A) Internet DMZ B) Internet Zone C) Production Network Zone D) Intranet Zone E) Management Network Zone
A) Internet DMZ
What is a restricted zone, as it strictly controls direct access for uncontrolled networks?
A) Internet DMZ B) Internet Zone C) Production Network Zone D) Intranet Zone E) Management Network Zone
C) Production Network Zone
What is a controlled zone with no heavy restrictions?
A) Internet DMZ B) Internet Zone C) Production Network Zone D) Intranet Zone E) Management Network Zone
D) Intranet Zone
What is a secured zone with strict policies?
A) Internet DMZ B) Internet Zone C) Production Network Zone D) Intranet Zone E) Management Network Zone
E) Management Network Zone
What is a security strategy in which several protection layers are placed throughout an information system?
A) Information Security Management Program
B) Enterprise Information Security Architecture (EISA)
C) Network Security Zoning
D) Defense-In-Depth
D) Defense-In-Depth
What are is the foundation of the security infrastructure?
A) Security Policies
B) Information Security Policies
C) Management
A) Security Policies
What defines the basic security requirements and rules to be implemented in order to protect and secure an organization’s systems?
A) Security Policies
B) Information Security Policies
C) Management
B) Information Security Policies
What policy has no restrictions on usage of systems resources?
A) Promiscuous Policy
B) Permissive Policy
C) Prudent Policy
D) Paranoid Policy
A) Promiscuous Policy
What policy is wide open and only known dangerous services/ attacks or behaviors are blocked?
A) Promiscuous Policy
B) Permissive Policy
C) Prudent Policy
D) Paranoid Policy
B) Permissive Policy
What policy provides maximum security by blocking all services, only individually enabling safe/ necessary services and everything is logged?
A) Promiscuous Policy
B) Permissive Policy
C) Prudent Policy
D) Paranoid Policy
C) Prudent Policy
What policy forbids everything, no internet connection, or severely limited internet usage?
A) Promiscuous Policy
B) Permissive Policy
C) Prudent Policy
D) Paranoid Policy
D) Paranoid Policy
What policy defines the resources being protected and the rules that control access to them?
A) Access Control Policy
B) Remote-Access Policy
C) User- Account Policy
D) Email Security Policy
A) Access Control Policy
What policy defines who can have remote access?
A) Access Control Policy
B) Remote-Access Policy
C) User- Account Policy
D) Email Security Policy
B) Remote-Access Policy
What policy defines the account creation process, authority, and rights and responsibility of the users accounts?
A) Access Control Policy
B) Remote-Access Policy
C) User- Account Policy
D) Email Security Policy
C) User- Account Policy
What policy defines the sensitivity levels of information?
A) Information-Protection Policy
B) Remote-Access Policy
C) User- Account Policy
D) Email Security Policy
A) Information-Protection Policy
What defines the access, management, and monitoring and monitoring of firewalls in an organization?
A) Information-Protection Policy
B) Remote-Access Policy
C) Firewall- Management Policy
D) Email Security Policy
C) Firewall- Management Policy
What policy defines the terms and conditions of granting special access to system resources?
A) Information-Protection Policy
B) Special-Access Policy
C) Firewall- Management Policy
D) Email Security Policy
B) Special-Access Policy
What policy is created to govern the proper usage of corporate email?
A) Information-Protection Policy
B) Special-Access Policy
C) Firewall- Management Policy
D) Email Security Policy
D) Email Security Policy
What policy defines the acceptable use of system resources?
A) Information-Protection Policy
B) Special-Access Policy
C) Acceptable-Use Policy
D) Email Security Policy
C) Acceptable-Use Policy
What policy provides guidelines for using strong password protection on organizations resources?
A) Passwords Policy
B) Special-Access Policy
C) Acceptable-Use Policy
D) Email Security Policy
A) Passwords Policy
What policy defines who can install new resources on the network, approve the installation of new devices, and document network changes?
A) Passwords Policy
B) Special-Access Policy
C) Network-Connection Policy
D) Email Security Policy
C) Network-Connection Policy
What refers to a degree of uncertainty or expectation that adverse event may cause damage to the system?
A) Risk
B) Risk Management
C) Incident
A) Risk
What is the process of reducing and maintaining risk at an acceptable level?
A) Risk
B) Risk Management
C) Incident
B) Risk Management
What is a risk assessment approach for analyzing security of an application by capturing, organizing, and analyzing all the information that affects the security of an application?
A) Risk
B) Risk Management
C) Incident
D) Threat Modeling
D) Threat Modeling
What is a set of defined processes to identify, analyze, prioritize, and resolve security incidents to restore normal service operations as quickly as possible and prevent future recurrence of the incident?
A) Risk
B) Risk Management
C) Incident Management
D) Threat Modeling
C) Incident Management
What does -f switch set?
A) Do Not Fragment
B) Send buffer size
C) Traceroutes
A) Do Not Fragment
What does the -l option mean?
A) Do Not Fragment
B) Send buffer size
C) Traceroutes
B) Send buffer size
What command traceroutes the network configuration information of the target domain?
A) Do Not Fragment
B) Send buffer size
C) tracert
C) tracert
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
A) read the first 512 bytes of the tape
B) Perform a full restore
C) Read the last 512 bytes of the tape
D) Restore a random file
B) Perform a full restore
If an attacker uses the SELECT* FROM user WHERE name = ‘x’ AND userid IS NULL; –; which type of SQL injection is the attacker performing?
A) UNION SQL injection
B) Tautology
C) End of Line Comment
D) Illegal / logically incorrect Query
C) End of Line Comment
To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.
What term is commonly utilized when referring to this type of testing?
A) Fuzzing
B) Bounding
C) Mutating
D) Randomizing
A) Fuzzing
What is purpose of a demilitarized zone on a network
A) To provide a place to put the honeypot
B) To only provide direct access to the notes within the DMZ and protect the network behind it
C) To scan all traffic coming through the DMZ to the internal network
D) To contain the network devices you wish to protect
B) To only provide direct access to the notes within the DMZ and protect the network behind it
Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?
A) -A
B) -T5
C) -O
D) -T0
B) -T5
You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible intrusion detection system.
What is the best approach?
A) Install and use Telnet to encrypt all outgoing traffic from this server.
B) Use HTTP so that all traffic can be routed via a browser, thus evading the internal intrusion detection systems.
C) Install Cryptcat and encrypt outgoing packets from this server.
D) Use alternate data streams to hide the outgoing packets from this server.
C) Install Cryptcat and encrypt outgoing packets from this server.
Which of the following antenna commonly used in communications for a frequency band of 10 MHz to VHF and UHF?
A) Parabolic grid antenna
B) Omnidirectional antenna
C) Dipole Antenna
D) Yagi antenna
D) Yagi antenna
Which of the following is a design pattern based on distinct pieces of software providing application functionality as service to other applications?
A) Object Oriented architecture
B) Lean Coding
C) Service Oriented Architecture
D) Agile Process
C) Service Oriented Architecture
When tuning security alerts, what is the best approach?
A) Decrease False Negatives
B) Decrease the false positives
C) Rise False positives Rise False Negatives
D) Tune to avoid False positive and False Negatives
D) Tune to avoid False positive and False Negatives
If you are the network admin and you get a complaint that some of the websites are no longer accessible.
You tried to ping the servers, it’s reachable. Then you type the IP address and then try on the browser, even then it accessible. But they are not accessible when you try using the URL. What may be the problem?
A) Traffic is Blocked on TCP port 80.
B) Traffic is Blocked on UDP port 53.
C) Traffic is Blocked on TCP port 54.
D) Traffic is blocked on UDP port 80.
B) Traffic is Blocked on UDP port 53.
You are performing a penetration test. You achieve access via a buffer overload exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrators bank account password and login information for the administrators Bitcoin account.
What should you do?
A) Do not report it and continue the penetration test.
B) Report immediately to the administrator.
C) Transfer money from the administrator’s account to another account.
D) Do not transfer the money but still the bitcoins.
B) Report immediately to the administrator.
You are a security officer of a company. You had an alert from IDS that indicate one PC on your Internet connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are starting investigation to know the severity of the situation roughly. Which of the following is appropriate to analyze?
A) Event logs on domain controller
B) Event logs on the PC
C) Internet Firewall / Proxy log
D) IDS log
C) Internet Firewall / Proxy log
What network security concept requires multiple layers of security controls to be placed throughout an IT infrastructure, which improves the security posture of an organization to defend against malicious attacks or potential vulnerabilities?
A) Network- Based Intrusion Detection System
B) Defense in depth
C) Security through obscurity
D) Host- Based Intrusion Detection System
B) Defense in depth
You need a tool that can perform network intrusion prevention, but also intrusion detection and can function as a network sniffer and records network activity, what tools would you most likely select?
A) Cain &Abel
B) Nmap
C) Snort
D) Nessus
C) Snort
In risk management, how is the “likelihood” related to the concept of “threat?”
A) Likelihood it’s a possible threat source that may exploit a vulnerability.
B) Likelihood is the probability that a threat source will exploit a vulnerability.
C) Likelihood is the likely source of a threat that could exploit a vulnerability.
D) Likelihood is the probability that vulnerability is the threat source.
B) Likelihood is the probability that a threat source will exploit a vulnerability.
Insecure direct object reference is a type of vulnerability where application doesn’t verify if the user is authorized to access internal object via its name or key. Suppose the malicious user Rob tries to gain access to the account of the benign user Ned.
Which of the following requests best illustrates an attempt to exploit an insecure direct object reference vulnerability?
A) GET /restricted/\r\n\%00account%00Ned%access
HTTP/1.1
Host: westbank.com
B) GET/restricted/accounts/?name=Ned HTTP/1.1
Host: westbank.com
C) GET/restricted/bank.getaccount(“Ned”) HTTP/1.1
Host: westbank.com
D) GET/ restricted/goldtransfer?to=Rob&from=1 or 1 HTTP
/1.1
Host: westbank.com
B) GET/restricted/accounts/?name=Ned HTTP/1.1
Host: westbank.com
In Wireshark, the packet bytes panes shows the data of the current packet in which format?
A) Binary
B) ASCII only
C) Decimal
D) Hexadecimal
D) Hexadecimal
During the process of encryption and decryption, what keys are shared?
A) Public Keys
B) User passwords
C) Public and private keys
D) Private Keys
A) Public Keys
Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out of the target network based on a pre-defined set of rules. Which of the following types of firewalls can protect against SQL injection attacks?
A) Data-driven firewall
B) Web application firewall
C) Stateful firewall
D) Packet firewall
B) Web application firewall
Which of the following in incorrect?
Standard Range (ft)
- 11a 150-150
- 11b 150-150
- 11g 150-150
- 16 (WiMax) 30 Miles
A) 802.11b
B) 802.11g
C) 802.11a
D) 802.16 (WiMax)
B) 802.11g
WPA2 utilizes AES for wireless data encryption at which of the following encryption levels?
A) 128 bit and CCMP
B) 128 bit and TKIP
C) 128 bit and CRC
D) 64 bit and CCMP
A) 128 bit and CCMP
What is the role of test automation in security testing?
A) it is an option but it tends to be very expensive
B) It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely.
C) Test automation is not usable in security due to the complexity of the tests
D) It should be utilized exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies.
B) It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely.
You are attempting to run a Nmap portscan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade an IDS?
A) Nmap -sT -O -T0
B) Nmap -sP -p-65535 -T5
C) Nmap -A -Pn
D) Nmap -A -host-timeout 99 -T1
A) Nmap -sT -O -T0
Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?
A) SYN/FIN scanning using IP fragments\
B) ICMP Echo scanning
C) ACK flag probe scanning
D) IPID scanning
A) SYN/FIN scanning using IP fragments\
Which of the following is a command line packet analyzer similar to GUI -based WireShark?
A) Jack the ripper
B) Nessus
C) tcpdump
D) ethereal
C) tcpdump
Which of the following attacks exploits web page vulnerabilities that allow an attacker to force an unsuspecting user;s browser to send malicious requests they did not intend?
A) Cross Site Request Forgery ( CSRF)
B) File Injection Attack
C) Command Injection Attacks
D) Hidden Field Manipulation Attack
A) Cross Site Request Forgery ( CSRF)
The “gray box testing” methodology enforces what kind of restriction?
A. Only the external operation of a system is accessible to the tester.
B. The internal operation of a system is completely known to the tester.
C. The internal operation of a system is only partly accessible to the tester.
D. Only the internal operation of a system is known to the tester.
C. The internal operation of a system is only partly accessible to the tester.
The “black box testing” methodology enforces which kind of restriction?
A. Only the internal operation of a system is known to the tester.
B. The internal operation of a system is completely known to the tester.
C. Only the external operation of a system is accessible to the tester.
D. The internal operation of a system is only partly accessible to the tester.
C. Only the external operation of a system is accessible to the tester.
Under the “Post-attack Phase and Activities,” it is the responsibility of the tester to restore the systems to a pretest state.
Which of the following activities should not included in this phase?
I. Removing all files uploaded on the system
II. Cleaning all registry entries
III. Mapping of network state
IV. Removing all tools and maintaining backdoor for reporting
A. III
B. IV
C. III and IV
D. All should be included
C. III and IV
The “white box testing” methodology enforces what kind of restriction?
A. The internal operation of a system is only partly accessible to the tester.
B. Only the external operation of a system is accessible to the tester.
C. Only the internal operation of a system is known to the tester.
D. The internal operation of a system is completely known to the tester.
D. The internal operation of a system is completely known to the tester.
A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Based on this information, what should be one of your key recommendations to the bank?
A. Place a front-end web server in a demilitarized zone that only handles external web traffic.
B. Move the financial data to another server on the same IP subnet
C. Require all employees to change their passwords immediately
D. Issue new certificates to the web servers from the root certificate authority
A. Place a front-end web server in a demilitarized zone that only handles external web traffic.
What is the process of logging, recording, and resolving events that take place in an organization?
A. Incident Management Process
B. Metrics
C. Internal Procedure
D. Security Policy
A. Incident Management Process
Nation-state threat actors often discover vulnerabilities and hold on the them until they want to launch a
sophisticated attack. The Sutxnet attack was an unprecedented style of attack because it used four types of vulnerability?
What is this style of attack called?
A. zero-hour
B. no-day
C. zero-day
D. zero-sum
C. zero-day
What is the benefit of performing an unannounced Penetration Testing?
A. It is best to catch critical infrastructure unpatched.
B. The tester will have an actual security posture visibility of the target network.
C. Network security would be in a “best state” posture.
D. The tester could not provide an honest analysis.
B. The tester will have an actual security posture visibility of the target network.
This international organization regulates billions of transactions daily and provides security guidelines to protect personally identifiable information (PII). These security controls provide a baseline and prevent low-level hackers sometimes known as script kiddies from causing a data breach.
Which of the following organizations is being described?
A. International Security Industry Organization (ISIO)
B. Center for Disease Control (CDC)
C. Payment Card Industry (PCI)
D. Institute of Electrical and Electronics Engineers (IEEE)
C. Payment Card Industry (PCI)
Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a backup plan, and testing plans for an organization?
A. Preparation phase
B. Identification phase
C. Recovery phase
D. Containment phase
A. Preparation phase
It is a regulation that has a set of guidelines, which should be adhered to by anyone who handles and electronic medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are in place while saving, accessing, and sharing any electronic medical data to keep patient data secure.
Which of the following regulations best matches the description?
A. HIPAA
B. COBIT
C. FISMA
D. ISO/IEC 27002
A. HIPAA
A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem
installed. Which is security policy it must the security analyst check to see if dial-out modems are allowed?
A. Firewall management policy
B. Permissive policy
C. Remote access policy
D. Acceptable use policy
C. Remote access policy
An enterprise recently moved to a new office in the new neighborhood is a little risky. The CEO wants to
monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?
A. Install a CCTV with cameras pointing to the entrance doors and the street
B. Use an IDS in the entrance doors and install some of them near the corners
C. Use lights in all the entrance doors and along the company’s perimeter
D. Use fences in the entrance doors
A. Install a CCTV with cameras pointing to the entrance doors and the street
Which of the following security policies define the use of VPN for gaining access to an internal corporate
network?
A. Network Security policy
B. Access control policy
C. Remote access policy
D. Information protection policy
C. Remote access policy
A newly discovered flaw in a software application would be considered which kind of security vulnerability?
A. Input validation flaw
B. 0-day vulnerability
C. Time-to-check to time-to-use flaw
D. HTTP header injection vulnerability
B. 0-day vulnerability
t has been reported to you that someone has caused an information spillage on their computer. You go to the
computer, disconnect it from the network, remove the keyboard and mouse, and power it down. What step in
incident handling did you just complete?
A. Recovery
B. Containment
C. Eradication
D. Discovery
B. Containment
What network security concept requires multiple layers of security controls to be placed through out an IT
infrastructure, which improves the security posture of an organization to defend against malicious attacks or
potential vulnerabilities?
A. Network-Based Intrusion Detection System
B. Defense in depth
C. Security through obscurity
D. Host-Based Intrusion Detection System
B. Defense in depth
Which type of security feature stops vehicles from crashing through the doors of a building?
A. Bollards
B. Mantrap
C. Receptionist
D. Turnstile
A. Bollards
Seth is starting a penetration test from inside the network. He hasn’t been given any information about the network. What type of test is he conducting?
A. External, Whitebox
B. External,Blackbox
C. Internal, Whitebox
D. Internal, Blackbox
D. Internal, Blackbox
Which protocol and port number might be needed in order to send log messages to a log analysis tool that
resides behind a firewall?
A. UDP 541
B. UDP 514
C. UDP 123
D. UDP 415
B. UDP 514
An unauthorized individual enters a building following an employee through the employee entrance after the
lunch rush. What type of breach has the individual just performed?
A. Tailgating
B. Reverse Social Engineering
C. Piggybacking
D. Announced
A. Tailgating
Code injection is a form of attack in which a malicious user:
A. Inserts additional code into the JavaScript running in the browser.
B. Gains access to the code base on the server and inserts new code.
C. Inserts text into a data field that gets interpreted as code.
D. Gets the server to execute arbitrary code using a buffer overflow.
C. Inserts text into a data field that gets interpreted as code.
In which of the following cryptography attack methods, attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?
A. Chosen-plaintext attack
B. Ciphertext-only attack
C. Adaptive chosen-plaintext attack
D. Known-plaintext attack
C. Adaptive chosen-plaintext attack
When conducting a penetration test it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network.Which of the following cannot be performed by the passive network sniffing?
A. Collecting unencrypted information about usernames and passwords
B. Modifying and replaying captured network traffic
C. Capturing a network traffic for further analysis
D. Identifying operating systems, services, protocols and devices
B. Modifying and replaying captured network traffic
Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in
the wired network to have Internet access.In the university campus there are many Ethernet ports available for professors and authorized visitors, but not for students. He identified this when the IDS alerted for malware activities in the network.
What Bob should do to avoid this problem?
A. Use the 802.1x protocol.
B. Disable unused ports in the switches.
C. Separate students in a different VLAN.
D. Ask students to use the wireless network.
A. Use the 802.1x protocol.
Steve, a scientist which works in a governmental security agency, developed a technological solution to
identify people based on walking patterns, and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve’s approach.
After that, people must approximate their RFID badges.Both identification are required to open the door. In this case, we can say:
A. Although the approach has two phases, it actually implements just one authentication factor
B. The solution implements the two authentication factors: physical object and physical characteristic
C. Biological motion cannot be used to identify people
D. The solution will have a high level of false positives
B. The solution implements the two authentication factors: physical object and physical characteristic
Bob finished a C programming course and created a small C application to monitor the network traffic and to
produce alerts when any origin sends “many” IP packets, based on the average number of packets sent by all origins and using some thresholds.
In concept, the solution developed by Bob is actually:
A. Just a network monitoring tool
B. A behavioral IDS
C. A signature IDS
D. A hybrid IDS
B. A behavioral IDS
Sam is working as a pen-tester in an organization in Houston. He performs penetration testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam sends large amount of packets to the target IDS that generate alerts which enable Sam to hide the real traffic. What type of method is Sam using to evade IDS?
A. Obfuscating
B. False Positive Generation
C. Insertion Attack
D. Denial-of-Service
B. False Positive Generation
Which of the following is a serious vulnerability in the popular OpenSSL cryptographic software library. This
weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.
A. SSL/TLS Renegotiation Vulnerability
B. POODLE
C. Shellshock
D. Heartbleed Bug
D. Heartbleed Bug
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he
uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate
CPU and memory activities.
Which type of virus detection method did Chandler use in this context?
A. Code Emulation
B. Scanning
C. Heuristic Analysis
D. Integrity checking
A. Code Emulation
ping -* 6 192.168.0.101
output
Pinging 192.168.0.101 with 32 bytes of data:
Reply from 192.168.0.101: bytes=32 time<1ms TTL=128
Reply from 192.168.0.101: bytes=32 time<1ms TTL=128
Reply from 192.168.0.101: bytes=32 time<1ms TTL=128
Reply from 192.168.0.101: bytes=32 time<1ms TTL=128
Reply from 192.168.0.101: bytes=32 time<1ms TTL=128
Reply from 192.168.0.101: bytes=32 time<1ms TTL=128
Ping statistics for 192.168.0.101:
Packets: Sent = 6, Received = 6, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
What does the option * here ?
A. ‘a
B. ‘n
C. ‘s
D. ‘t
B. ‘n
The purpose of a __________ is to deny network access to local area networks and other information assets by unauthorized wireless devices.
A. Wireless Access Control List
B. Wireless Jammer
C. Wireless Analyzer
D. Wireless Access Point
A. Wireless Access Control List
You have compromised a server and successfully gained a root access. You want to pivot and pass traffic
undetected over the network and evade any possible Intrusion Detection System.
What is the best approach?
A. Install and use Telnet to encrypt all outgoing traffic from this server.
B. Use HTTP so that all traffic can be routed via a browser, thus evading the internal Intrusion Detection
Systems.
C. Install Cryptcat and encrypt outgoing packets from this server.
D. Use Alternate Data Streams to hide the outgoing packets from this server.
C. Install Cryptcat and encrypt outgoing packets from this server.
NMAP -sn 192.168.11.200-215
The NMAP command above performs which of the following?
A. An operating system detect
B. A trace sweep
C. A port scan
D. A ping scan
D. A ping scan
Initiating an attack against targeted businesses and organizations, threat actors compromise a carefully
selected website by inserting an exploit resulting in malware infection. The attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. Aside from carefully choosing sites to
compromise, these attacks are known to incorporate zero-day exploits that target unpatched vulnerabilities.
Thus, the targeted entities are left with little or no defense against these exploits.
What type of attack is outlined in the scenario?
A. Watering Hole Attack
B. Shellshock Attack
C. Heartbleed Attack
D. Spear Phising Attack
A. Watering Hole Attack
Which tool can be used to silently copy files from USB devices?
A. USB Sniffer
B. USB Snoopy
C. USB Grabber
D. USB Dumper
D. USB Dumper