First 100 Flashcards
At a Windows Server command prompt, which command could be used to list the running
services?
A.
Sc query type= running
B.
Sc query \servername
C.
Sc query
D.
Sc config
c
Which of the following is optimized for confidential communications, such as bidirectional voice
and video?
A.
RC4
B.
RC5
C.
MD4
D.
MD5
A
The use of alert thresholding in an IDS can reduce the volume of repeated alerts, but introduces
which of the following vulnerabilities?
A.
An attacker,working slowly enough,can evade detection by the IDS.
B.
Network packets are dropped if the volume exceeds the threshold.
C.
Thresholding interferes with the IDS’ ability to reassemble fragmented packets.
D.
The IDS will not distinguish among packets originating from different sources.
a
A person approaches a network administrator and wants advice on how to send encrypted email
from home. The end user does not want to have to pay for any license fees or manage server
services. Which of the following is the most secure encryption protocol that the network
administrator should recommend?
A. IP Security (IPSEC)
B.
Multipurpose Internet Mail Extensions (MIME)
C.
Pretty Good Privacy (PGP)
D.
Hyper Text Transfer Protocol with Secure Socket Layer (HTTPS)
C
Which of the following is considered an acceptable option when managing a risk?
A.
Reject the risk.
B.
Deny the risk.
C.
Mitigate the risk.
D.
Initiate the risk.
C
Which of the following countermeasure can specifically protect against both the MAC Flood and
MAC Spoofing attacks?
A.
Configure Port Security on the switch
B.
Configure Port Recon on the switch
C.
Configure Switch Mapping
D.
Configure Multiple Recognition on the switch
a
__________ is found in all versions of NTFS and is described as the ability to fork file data into
existing files without affecting their functionality, size, or display to traditional file browsing utilities
like dir or Windows Explorer
A.
Alternate Data Streams
B.
Merge Streams
C.
Steganography
D.
NetBIOS vulnerability
a
A company is legally liable for the content of email that is sent from its systems, regardless of
whether the message was sent for private or business-related purposes. This could lead to
prosecution for the sender and for the company’s directors if, for example, outgoing email was
found to contain material that was pornographic, racist, or likely to incite someone to commit an
act of terrorism. You can always defend yourself by “ignorance of the law” clause.
A.
true
B.
false
B
Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines
to create or alter SQL commands to gain access to private data or execute commands in the
database. What technique does Jimmy use to compromise a database?
A.
Jimmy can submit user input that executes an operating system command to compromise a
target system
B.
Jimmy can gain control of system to flood the target system with requests,preventing legitimate
users from gaining access
C.
Jimmy can utilize an incorrect configuration that leads to access with higher-than expected
privilege of the database
D.
Jimmy can utilize this particular database threat that is an SQL injection technique to penetrate
a target system
D
Paul has just finished setting up his wireless network. He has enabled numerous security features
such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his
wireless router. Paul notices that when he uses his wireless connection, the speed is sometimes
54 Mbps and sometimes it is only 24Mbps or less. Paul connects to his wireless router’s
management utility and notices that a machine with an unfamiliar name is connected through his
wireless connection. Paul checks the router’s logs and notices that the unfamiliar machine has the
same MAC address as his laptop. What is Paul seeing here?
A.
MAC spoofing
B.
Macof
C.
ARP spoofing
D.
DNS spoofing
A
This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and
the IDS will not spot the true nature of the fully assembled datagram. The datagram is not
reassembled until it reaches its final destination. It would be a processor-intensive task for IDS to
reassemble all fragments itself, and on a busy system the packet will slip through the IDS onto the
network. What is this technique called?
A.
IP Routing or Packet Dropping
B.
IDS Spoofing or Session Assembly
C.
IP Fragmentation or Session Splicing
D.
IP Splicing or Packet Reassembly
C
What two things will happen if a router receives an ICMP packet, which has a TTL value of 1, and
the destination host is several hops away? (Select 2 answers)
A.
The router will discard the packet
B.
The router will decrement the TTL value and forward the packet to the next router on the path
to the destination host
C.
The router will send a time exceeded message to the source host
D.
The router will increment the TTL value and forward the packet to the next router on the path to
the destination host.
E.
The router will send an ICMP Redirect Message to the source host
A,C
If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of
business, they just have to find a job opening, prepare someone to pass the interview, have that
person hired, and they will be in the organization.
How would you prevent such type of attacks?
A.
It is impossible to block these attacks
B.
Hire the people through third-party job agencies who will vet them for you
C.
Conduct thorough background checks before you engage them
D.
Investigate their social networking profiles
C
Which of the following LM hashes represents a password of less than 8 characters?
A.
0182BD0BD4444BF836077A718CCDF409
B.
44EFCE164AB921CQAAD3B435B51404EE
C.
BA810DBA98995F1817306D272A9441BB
D.
CEC52EB9C8E3455DC2265B23734E0DAC
E.
B757BF5C0D87772FAAD3B435B51404EE
F.
E52CAC67419A9A224A3B108F3FA6CB6D
B,E
This type of Port Scanning technique splits TCP header into several packets so that the packet
filters are not able to detect what the packets intends to do.
A.
UDP Scanning
B.
IP Fragment Scanning
C.
Inverse TCP flag scanning
D.
ACK flag scanning
B
While investigating a claim of a user downloading illegal material, the investigator goes through
the files on the suspect’s workstation. He comes across a file that is just called “file.txt” but when
he opens it, he finds the following:
What can he infer from this file?
A.
A picture that has been renamed with a .txt extension
B.
An encrypted file
C.
An encoded file
D.
A buffer overflow
D
Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in
order to find some information about the target they are attempting to penetrate. How would you
call this type of activity?
A.
Dumpster Diving
B.
Scanning
C.
CI Gathering
D.
Garbage Scooping
A
Harold is the senior security analyst for a small state agency in New York. He has no other
security professionals that work under him, so he has to do all the security-related tasks for the
agency. Coming from a computer hardware background, Harold does not have a lot of experience
with security methodologies and technologies, but he was the only one who applied for the
position. Harold is currently trying to run a Sniffer on the agency’s network to get an idea of what
kind of traffic is being passed around, but the program he is using does not seem to be capturing
anything. He pours through the Sniffer’s manual, but cannot find anything that directly relates to
his problem. Harold decides to ask the network administrator if he has any thoughts on the
problem. Harold is told that the Sniffer was not working because the agency’s network is a
switched network, which cannot be sniffed by some programs without some tweaking. What
technique could Harold use to sniff his agency’s switched network?
A.
ARP spoof the default gateway
B.
Conduct MiTM against the switch
C.
Launch smurf attack against the switch
D.
Flood the switch with ICMP packets
A
Anonymizer sites access the Internet on your behalf, protecting your personal information from
disclosure. An anonymizer protects all of your computer’s identifying information while it surfs for
you, enabling you to remain at least one step removed from the sites you visit.
You can visit Web sites without allowing anyone to gather information on sites visited by you.
Services that provide anonymity disable pop-up windows and cookies, and conceal visitor’s IP
address.
These services typically use a proxy server to process each HTTP request. When the user
requests a Web page by clicking a hyperlink or typing a URL into their browser, the service
retrieves and displays the information using its own server. The remote server (where the
requested Web page resides) receives information on the anonymous Web surfing service in
place of your information.
In which situations would you want to use anonymizer? (Select 3 answers)
A.
Increase your Web browsing bandwidth speed by using Anonymizer
B.
To protect your privacy and Identity on the Internet
C.
To bypass blocking applications that would prevent access to Web sites or parts of sites that
you want to visit.
D.
Post negative entries in blogs without revealing your IP identity
B,C,D
Which Windows system tool checks integrity of critical files that has been digitally signed by
Microsoft?
A.
signverif.exe
B.
sigverif.exe
C.
msverif.exe
D.
verifier.exe
B
Botnets are networks of compromised computers that are controlled remotely and surreptitiously
by one or more cyber criminals. How do cyber criminals infect a victim’s computer with bots?
(Select 4 answers)
A.
Attackers physically visit every victim’s computer to infect them with malicious software
B.
Home computers that have security vulnerabilities are prime targets for botnets
C.
Spammers scan the Internet looking for computers that are unprotected and use these “opendoors” to install malicious software
D.
Attackers use phishing or spam emails that contain links or attachments
E.
Attackers use websites to host the bots utilizing Web Browser vulnerabilities
B,C,D,E
Jack Hacker wants to break into Brown Co.’s computers and obtain their secret double fudge
cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator
from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to
verify her password with him ”just to double check our records.” Jane does not suspect anything
amiss, and parts with her password. Jack can now access Brown Co.’s computers with a valid
user name and password, to steal the cookie recipe. What kind of attack is being illustrated here?
A.
Reverse Psychology
B.
Reverse Engineering
C.
Social Engineering
D.
Spoofing Identity
E.
Faking Identity
C
What is the essential difference between an ‘Ethical Hacker’ and a ‘Cracker’?
A.
The ethical hacker does not use the same techniques or skills as a cracker.
B.
The ethical hacker does it strictly for financial motives unlike a cracker.
C.
The ethical hacker has authorization from the owner of the target.
D.
The ethical hacker is just a cracker who is getting paid.
C
The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the
security breaches before a cracker does. There is nothing that says that a cracker does not get
paid for the work he does,a ethical hacker has the owners authorization and will get paid even if
he does not succeed to penetrate the target.
How do you defend against ARP Spoofing? Select three.
A.
Use ARPWALL system and block ARP spoofing attacks
B.
Tune IDS Sensors to look for large amount of ARP traffic on local subnets
C.
Use private VLANS
D.
Place static ARP entries on servers,workstation and routers
A,C,D
ARPwall is used in protecting against ARP spoofing.
Incorrect answer:
IDS option may works fine in case of monitoring the traffic from outside the network but not from
internal hosts.
What does the term “Ethical Hacking” mean?
A.
Someone who is hacking for ethical reasons.
B.
Someone who is using his/her skills for ethical reasons.
C.
Someone who is using his/her skills for defensive purposes.
D.
Someone who is using his/her skills for offensive purposes
C
TCP SYN Flood attack uses the three-way handshake mechanism.
1. An attacker at system A sends a SYN packet to victim at system B.
2. System B sends a SYN/ACK packet to victim A.
3. As a normal three-way handshake mechanism system A should send an ACK packet to system
B, however, system A does not send an ACK packet to system B. In this case client B is waiting
for an ACK packet from client A.
This status of client B is called _________________
A.
“half-closed”
B.
“half open”
C.
“full-open”
D.
“xmas-open”
B
Lori is a Certified Ethical Hacker as well as a Certified Hacking Forensics Investigator working as
an IT security consultant. Lori has been hired on by Kiley Innovators, a large marketing firm that
recently underwent a string of thefts and corporate espionage incidents. Lori is told that a rival
marketing company came out with an exact duplicate product right before Kiley Innovators was
about to release it. The executive team believes that an employee is leaking information to the
rival company. Lori questions all employees, reviews server logs, and firewall logs; after which she
finds nothing. Lori is then given permission to search through the corporate email system. She
searches by email being sent to and sent from the rival marketing company.
She finds one employee that appears to be sending very large email to this other marketing
company, even though they should have no reason to be communicating with them. Lori tracks
down the actual emails sent and upon opening them, only finds picture files attached to them.
These files seem perfectly harmless, usually containing some kind of joke. Lori decides to use
some special software to further examine the pictures and finds that each one had hidden text that
was stored in each picture.
What technique was used by the Kiley Innovators employee to send information to the rival
marketing company?
A.
The Kiley Innovators employee used cryptography to hide the information in the emails sent
B.
The method used by the employee to hide the information was logical watermarking
C.
The employee used steganography to hide information in the picture attachments
D.
By using the pictures to hide information,the employee utilized picture fuzzing
C
What is “Hacktivism”?
A.
Hacking for a cause
B.
Hacking ruthlessly
C.
An association which groups activists
D.
None of the above
A
Where should a security tester be looking for information that could be used by an attacker against
an organization? (Select all that apply)
A.
CHAT rooms
B.
WHOIS database
C.
News groups
D.
Web sites
E.
Search engines
F.
Organization’s own web site
A-F
A Security tester should search for information everywhere that he/she can access.
You never know where you find that small piece of information that could penetrate a strong
defense.
How do you defend against Privilege Escalation?
A.
Use encryption to protect sensitive data
B.
Restrict the interactive logon privileges
C.
Run services as unprivileged accounts
D.
Allow security settings of IE to zero or Low
E.
Run users and applications on the least privileges
A,B,C,E
What are the two basic types of attacks? (Choose two.
A.
DoS
B.
Passive
C.
Sniffing
D.
Active
E.
Cracking
B,D
What does ICMP (type 11, code 0) denote?
A.
Source Quench
B.
Destination Unreachable
C.
Time Exceeded
D.
Unknown Type
C
User which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and
mail fraud?
A.
18 U.S.C 1029 Possession of Access Devices
B.
18 U.S.C 1030 Fraud and related activity in connection with computers
C.
18 U.S.C 1343 Fraud by wire,radio or television
D.
18 U.S.C 1361 Injury to Government Property
E.
18 U.S.C 1362 Government communication systems
F.
18 U.S.C 1831 Economic Espionage Act
G.
18 U.S.C 1832 Trade Secrets Act
B
You are the security administrator of Jaco Banking Systems located in Boston. You are setting up
e-banking website (http://www.ejacobank.com) authentication system. Instead of issuing banking
customer with a single password, you give them a printed list of 100 unique passwords. Each time
the customer needs to log into the e-banking system website, the customer enters the next
password on the list. If someone sees them type the password using shoulder surfing, MiTM or
keyloggers, then no damage is done because the password will not be accepted a second time.
Once the list of 100 passwords is almost finished, the system automatically sends out a new
password list by encrypted e-mail to the customer.
You are confident that this security implementation will protect the customer from password abuse.
Two months later, a group of hackers called “HackJihad” found a way to access the one-time
password list issued to customers of Jaco Banking Systems. The hackers set up a fake website
(http://www.e-jacobank.com) and used phishing attacks to direct ignorant customers to it. The fake
website asked users for their e-banking username and password, and the next unused entry from
their one-time password sheet. The hackers collected 200 customer’s username/passwords this
way. They transferred money from the customer’s bank account to various offshore accounts.
Your decision of password policy implementation has cost the bank with USD 925, 000 to hackers.
You immediately shut down the e-banking website while figuring out the next best security solution
What effective security solution will you recommend in this case?
A.
Implement Biometrics based password authentication system. Record the customers face
image to the authentication database
B.
Configure your firewall to block logon attempts of more than three wrong tries
C.
Enable a complex password policy of 20 characters and ask the user to change the password
immediately after they logon and do not store password histories
D.
Implement RSA SecureID based authentication system
D
Which of the following activities will NOT be considered as passive footprinting?
A.
Go through the rubbish to find out any information that might have been discarded.
B.
Search on financial site such as Yahoo Financial to identify assets.
C.
Scan the range of IP address found in the target DNS database.
–D. Perform multiples queries using a search engine.
C
More sophisticated IDSs look for common shellcode signatures. But even these systems can be
bypassed, by using polymorphic shellcode. This is a technique common among virus writers ?it
basically hides the true nature of the shellcode in different disguises.
How does a polymorphic shellcode work?
A.
They encrypt the shellcode by XORing values over the shellcode,using loader code to decrypt
the shellcode,and then executing the decrypted shellcode
B.
They convert the shellcode into Unicode,using loader to convert back to machine code then
executing them
C.
They reverse the working instructions into opposite order by masking the IDS signatures
D.
They compress shellcode into normal instructions,uncompress the shellcode using loader code
and then executing the shellcode
A
Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP)
addresses/names with the intent of diverting traffic?
A.
Network aliasing
B.
Domain Name Server (DNS) poisoning
C.
Reverse Address Resolution Protocol (ARP)
D.
Port scanning
B
Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP)
addresses/names with the intent of diverting traffic?
A.
Network aliasing
B.
Domain Name Server (DNS) poisoning
C.
Reverse Address Resolution Protocol (ARP)
D.
Port scanning
B
SYN Flood is a DOS attack in which an attacker deliberately violates the three-way handshake
and opens a large number of half-open TCP connections. The signature of attack for SYN Flood
contains:
A.
The source and destination address having the same value
B.
A large number of SYN packets appearing on a network without the corresponding reply
packets
C.
The source and destination port numbers having the same value
D.
A large number of SYN packets appearing on a network with the corresponding reply packets
B
A XYZ security System Administrator is reviewing the network system log files.
He notes the following:
Network log files are at 5 MB at 12:00 noon.
At 14:00 hours,the log files at 3 MB.
What should he assume has happened and what should he do about the situation?
A.
He should contact the attacker’s ISP as soon as possible and have the connection
disconnected.
B.
He should log the event as suspicious activity,continue to investigate,and take further steps
according to site security policy.
C.
He should log the file size,and archive the information,because the router crashed.
D.
He should run a file system check,because the Syslog server has a self correcting file system
problem.
E.
He should disconnect from the Internet discontinue any further unauthorized use,because an
attack has taken place.
B
Which of the following type of scanning utilizes automated process of proactively identifying
vulnerabilities of the computing systems present on a network?
A.
Port Scanning
B.
Single Scanning
C.
External Scanning
D.
Vulnerability Scanning
D
To what does “message repudiation” refer to what concept in the realm of email security?
A.
Message repudiation means a user can validate which mail server or servers a message was
passed through.
B.
Message repudiation means a user can claim damages for a mail message that damaged their
reputation.
C.
Message repudiation means a recipient can be sure that a message was sent from a particular
person.
D.
Message repudiation means a recipient can be sure that a message was sent from a certain
host.
E.
Message repudiation means a sender can claim they did not actually send a particular
message.
Explanation:
A quality that prevents a third party from being able to prove that a communication
between two other parties ever took place. This is a desirable quality if you do not want your
communications to be traceable.
Non-repudiation is the opposite quality—a third party can prove that a communication between
two other parties took place. Non-repudiation is desirable if you want to be able to trace your
communications and prove that they occurred. Repudiation – Denial of message submission or
delivery.
E
Snort has been used to capture packets on the network. On studying the packets, the penetration
tester finds it to be abnormal. If you were the penetration tester, why would you find this
abnormal?
What is odd about this attack? (Choose the most appropriate statement)
A.
This is not a spoofed packet as the IP stack has increasing numbers for the three flags.
B.
This is back orifice activity as the scan comes from port 31337.
C.
The attacker wants to avoid creating a sub-carrier connection that is not normally valid.
D.
There packets were created by a tool; they were not created by a standard IP stack.
B
What are the limitations of Vulnerability scanners? (Select 2 answers)
A.
There are often better at detecting well-known vulnerabilities than more esoteric ones
B.
The scanning speed of their scanners are extremely high
C.
It is impossible for any,one scanning product to incorporate all known vulnerabilities in a timely
manner
D.
The more vulnerabilities detected,the more tests required
E.
They are highly expensive and require per host scan license
A,C
Your XYZ trainee Sandra asks you which are the four existing Regional Internet Registry (RIR’s)?
A.
APNIC,PICNIC,ARIN,LACNIC
B.
RIPE NCC,LACNIC,ARIN,APNIC
C.
RIPE NCC,NANIC,ARIN,APNIC
D.
RIPE NCC,ARIN,APNIC,LATNIC
B
Stephanie works as senior security analyst for a manufacturing company in Detroit. Stephanie
manages network security throughout the organization. Her colleague Jason told her in confidence
that he was able to see confidential corporate information posted on the external website
http://www.jeansclothesman.com. He tries random URLs on the company’s website and finds
confidential information leaked over the web. Jason says this happened about a month ago.
Stephanie visits the said URLs, but she finds nothing. She is very concerned about this, since
someone should be held accountable if there was sensitive information posted on the website.
Where can Stephanie go to see past versions and pages of a website?
A.
She should go to the web page Samspade.org to see web pages that might no longer be on the
website
B.
If Stephanie navigates to Search.com; she will see old versions of the company website
C.
Stephanie can go to Archive.org to see past versions of the company website
D.
AddressPast.com would have any web pages that are no longer hosted on the company’s
website
C
A very useful resource for passively gathering information about a target company is:
A.
Host scanning
B.
Whois search
C.
Traceroute
D.
Ping sweep
B
Dan is conducting penetration testing and has found a vulnerability in a Web Application which
gave him the sessionID token via a cross site scripting vulnerability. Dan wants to replay this
token. However, the session ID manager (on the server) checks the originating IP address as well.
Dan decides to spoof his IP address in order to replay the sessionID. Why do you think Dan might
not be able to get an interactive session?
A.
Dan cannot spoof his IP address over TCP network
B.
The scenario is incorrect as Dan can spoof his IP and get responses
C.
The server will send replies back to the spoofed IP address
D.
Dan can establish an interactive session only if he uses a NAT
C
You receive an email with the following message:
Hello Steve,
We are having technical difficulty in restoring user database record after the recent blackout. Your
account data is corrupted. Please logon to the SuperEmailServices.com and change your
password.
http://www.supermailservices.com@0xde.0xad.0xbe.0xef/support/logon.htm
If you do not reset your password within 7 days, your account will be permanently disabled locking
you out from our e-mail services.
Sincerely,
Technical Support
SuperEmailServices
From this e-mail you suspect that this message was sent by some hacker since you have been
using their e-mail services for the last 2 years and they have never sent out an e-mail such as this.
You also observe the URL in the message and confirm your suspicion about
0xde.0xad.0xbde.0xef which looks like hexadecimal numbers. You immediately enter the following
at Windows 2000 command prompt:
Ping 0xde.0xad.0xbe.0xef
You get a response with a valid IP address.
What is the obstructed IP address in the e-mail URL?
A.
222.173.190.239
B.
233.34.45.64
C.
54.23.56.55
D.
199.223.23.45
Explanation:
0x stands for hexadecimal and DE=222,AD=173,BE=190 and EF=239
A
0x stands for hexadecimal and DE=222,AD=173,BE=190 and EF=239
Jason works in the sales and marketing department for a very large advertising agency located in
Atlanta. Jason is working on a very important marketing campaign for his company’s largest client.
Before the project could be completed and implemented, a competing advertising company comes
out with the exact same marketing materials and advertising, thus rendering all the work done for
Jason’s client unusable. Jason is questioned about this and says he has no idea how all the
material ended up in the hands of a competitor.
Without any proof, Jason’s company cannot do anything except move on. After working on
another high profile client for about a month, all the marketing and sales material again ends up in
the hands of another competitor and is released to the public before Jason’s company can finish
the project. Once again, Jason says that he had nothing to do with it and does not know how this
could have happened. Jason is given leave with pay until they can figure out what is going on.
Jason’s supervisor decides to go through his email and finds a number of emails that were sent to
the competitors that ended up with the marketing material. The only items in the emails were
attached jpg files, but nothing else. Jason’s supervisor opens the picture files, but cannot find
anything out of the ordinary with them.
What technique has Jason most likely used?
A.
Stealth Rootkit Technique
B.
ADS Streams Technique
C.
Snow Hiding Technique
D.
Image Steganography Technique
D
Which of the following tools are used for footprinting? (Choose four)
A.
Sam Spade
B.
NSLookup
C.
Traceroute
D.
Neotrace
E.
Cheops
Explanation:
All of the tools listed are used for footprinting except Cheops.
A-D
According to the CEH methodology, what is the next step to be performed after footprinting?
A.
Enumeration
B.
Scanning
C.
System Hacking
D.
Social Engineering
E.
Expanding Influence
Explanation:
Once footprinting has been completed,scanning should be attempted next.
Scanning should take place on two distinct levels: network and host.
B
Once footprinting has been completed,scanning should be attempted next.
Scanning should take place on two distinct levels: network and host.
An attacker finds a web page for a target organization that supplies contact information for the
company. Using available details to make the message seem authentic, the attacker drafts e-mail
to an employee on the contact page that appears to come from an individual who might
reasonably request confidential information, such as a network administrator.
The email asks the employee to log into a bogus page that requests the employee’s user name
and password or click on a link that will download spyware or other malicious programming.
Google’s Gmail was hacked using this technique and attackers stole source code and sensitive
data from Google servers. This is highly sophisticated attack using zero-day exploit vectors, social
engineering and malware websites that focused on targeted individuals working for the company.
What is this deadly attack called?
A.
Spear phishing attack
B.
Trojan server attack
C.
Javelin attack
D.
Social networking attack
A
NSLookup is a good tool to use to gain additional information about a target network. What does the following command accomplish? nslookup > server > set type =any > ls -d
A.
Enables DNS spoofing
B.
Loads bogus entries into the DNS table
C.
Verifies zone security
D.
Performs a zone transfer
E.
Resets the DNS cache
D
If DNS has not been properly secured,the command sequence displayed above will
perform a zone transfer.
Vulnerability scanners are automated tools that are used to identify vulnerabilities and
misconfigurations of hosts. They also provide information regarding mitigating discovered
vulnerabilities.Which of the following statements is incorrect?
A.
Vulnerability scanners attempt to identify vulnerabilities in the hosts scanned.
B.
Vulnerability scanners can help identify out-of-date software versions,missing patches,or
system upgrades
C.
They can validate compliance with or deviations from the organization’s security policy
D.
Vulnerability scanners can identify weakness and automatically fix and patch the vulnerabilities
without user intervention
D
While footprinting a network, what port/service should you look for to attempt a zone transfer?
A.
53 UDP
B.
53 TCP
C.
25 UDP
D.
25 TCP
E.
161 UDP
F.
22 TCP
G.
60 TCP
B
How does traceroute map the route a packet travels from point A to point B?
A.
Uses a TCP timestamp packet that will elicit a time exceeded in transit message
B.
Manipulates the value of the time to live (TTL) within packet to elicit a time exceeded in transit
message
C.
Uses a protocol that will be rejected by gateways on its way to the destination
D.
Manipulates the flags within packets to force gateways into generating error messages
B
Traceroute works by increasing the “time-to-live” value of each successive batch of packets sent.
The first three packets have a time-to-live (TTL) value of one (implying that they make a single
hop). The next three packets have a TTL value of 2,and so on. When a packet passes through a
host,normally the host decrements the TTL value by one,and forwards the packet to the next host.
When a packet with a TTL of one reaches a host,the host discards the packet and sends an ICMP
time exceeded (type 11) packet to the sender. The traceroute utility uses these returning packets
to produce a list of hosts that the packets have traversed en route to the destination
Your lab partner is trying to find out more information about a competitors web site. The site has a
.com extension. She has decided to use some online whois tools and look in one of the regional
Internet registrys. Which one would you suggest she looks in first?
A.
LACNIC
B.
ARIN
C.
APNIC
D.
RIPE
E.
AfriNIC
Explanation:
Regional registries maintain records from the areas from which they govern. ARIN is
responsible for domains served within North and South America and therefore,would be a good
starting point for a .com domain.
B
Regional registries maintain records from the areas from which they govern. ARIN is
responsible for domains served within North and South America and therefore,would be a good
starting point for a .com domain.
How do you defend against DHCP Starvation attack?
A.
Enable ARP-Block on the switch
B.
Enable DHCP snooping on the switch
C.
Configure DHCP-BLOCK to 1 on the switch
D.
Install DHCP filters on the switch to block this atta
B
Joe Hacker runs the hping2 hacking tool to predict the target host’s sequence numbers in one of
the hacking session.
What does the first and second column mean? Select two.
A.
The first column reports the sequence number
B.
The second column reports the difference between the current and last sequence number
C.
The second column reports the next sequence number
D.
The first column reports the difference between current and last sequence number
A,B
The SYN flood attack sends TCP connections requests faster than a machine can process them.
Attacker creates a random source address for each packet
SYN flag set in each packet is a request to open a new connection to the server from the
spoofed IP address
Victim responds to spoofed IP address,then waits for confirmation that never arrives (timeout
wait is about 3 minutes)
Victim’s connection table fills up waiting for replies and ignores new connections
Legitimate users are ignored and will not be able to access the server
How do you protect your network against SYN Flood attacks?
A.
SYN cookies. Instead of allocating a record,send a SYN-ACK with a carefully constructed
sequence number generated as a hash of the clients IP address,port number,and other
information. When the client responds with a normal ACK,that special sequence number will
beincluded,which the server then verifies. Thus,the server first allocates memory on the third
packet of the handshake,not the first.
B.
RST cookies – The server sends a wrong SYN/ACK back to the client. The client should then
generate a RST packet telling the server that something is wrong. At this point,the server knows
the client is valid and will now accept incoming connections from that client normally
C.
Check the incoming packet’s IP address with the SPAM database on the Internet and enable
the filter using ACLs at the Firewall
D.
Stack Tweaking. TCP stacks can be tweaked in order to reduce the effect of SYN floods.
Reduce the timeout before a stack frees up the memory allocated for a connection
E.
Micro Blocks. Instead of allocating a complete connection,simply allocate a micro record of 16-bytes for the incoming SYN object
A,B,D,E
While performing a ping sweep of a subnet you receive an ICMP reply of Code 3/Type 13 for all
the pings sent out.
What is the most likely cause behind this response?
A.
The firewall is dropping the packets.
B.
An in-line IDS is dropping the packets.
C.
A router is blocking ICMP.
D.
The host does not respond to ICMP packets.
C
Stephanie works as a records clerk in a large office building in downtown Chicago. On Monday,
she went to a mandatory security awareness class (Security5) put on by her company’s IT
department. During the class, the IT department informed all employees that everyone’s Internet
activity was thenceforth going to be monitored.
Stephanie is worried that her Internet activity might give her supervisor reason to write her up, or
worse get her fired. Stephanie’s daily work duties only consume about four hours of her time, so
she usually spends the rest of the day surfing the web. Stephanie really enjoys surfing the Internet
but definitely does not want to get fired for it.
What should Stephanie use so that she does not get in trouble for surfing the Internet?
A.
Stealth IE
B.
Stealth Anonymizer
C.
Stealth Firefox
D.
Cookie Disabler
B
Bob has been hired to perform a penetration test on XYZ.com. He begins by looking at IP address
ranges owned by the company and details of domain name registration. He then goes to News
Groups and financial web sites to see if they are leaking any sensitive information of have any
technical details online.
Within the context of penetration testing methodology, what phase is Bob involved with?
A.
Passive information gathering
B.
Active information gathering
C.
Attack phase
D.
Vulnerability Mapping
A
Neil is a network administrator working in Istanbul. Neil wants to setup a protocol analyzer on his
network that will receive a copy of every packet that passes through the main office switch. What
type of port will Neil need to setup in order to accomplish this?
A.
Neil will have to configure a Bridged port that will copy all packets to the protocol analyzer.
B.
Neil will need to setup SPAN port that will copy all network traffic to the protocol analyzer.
C.
He will have to setup an Ether channel port to get a copy of all network traffic to the analyzer.
D.
He should setup a MODS port which will copy all network traffic.
B
Which of the following would be the best reason for sending a single SMTP message to an
address that does not exist within the target company?
A.
To create a denial of service attack.
B.
To verify information about the mail administrator and his address.
C.
To gather information about internal hosts used in email treatment.
D.
To gather information about procedures that are in place to deal with such messages
C
The replay from the email server that states that there is no such recipient will also
give you some information about the name of the email server,versions used and so on.
You are conducting a port scan on a subnet that has ICMP blocked. You have discovered 23 live
systems and after scanning each of them you notice that they all show port 21 in closed state.
What should be the next logical step that should be performed?
A.
Connect to open ports to discover applications.
B.
Perform a ping sweep to identify any additional systems that might be up.
C.
Perform a SYN scan on port 21 to identify any additional systems that might be up.
D.
Rescan every computer to verify the results.
C
Jayden is a network administrator for her company. Jayden wants to prevent MAC spoofing on all
the Cisco switches in the network. How can she accomplish this?
A.
Jayden can use the commanD. ip binding set.
B.
Jayden can use the commanD. no ip spoofing.
C.
She should use the commanD. no dhcp spoofing.
D.
She can use the commanD. ip dhcp snooping binding.
D
Ann would like to perform a reliable scan against a remote target. She is not concerned about
being stealth at this point.
Which of the following type of scans would be the most accurate and reliable option?
A.
A half-scan
B.
A UDP scan
C.
A TCP Connect scan
D.
A FIN scan
C
War dialing is a very old attack and depicted in movies that were made years ago.
Why would a modem security tester consider using such an old technique?
A.
It is cool,and if it works in the movies it must work in real life.
B.
It allows circumvention of protection mechanisms by being on the internal network.
C.
It allows circumvention of the company PBX.
D.
A good security tester would not use such a derelict technique.
B
Google uses a unique cookie for each browser used by an individual user on a computer. This
cookie contains information that allows Google to identify records about that user on its database.
This cookie is submitted every time a user launches a Google search, visits a site using AdSense
etc. The information stored in Google’s database, identified by the cookie, includes
Everything you search for using Google
Every web page you visit that has Google Adsense ads
How would you prevent Google from storing your search keywords?
A.
Block Google Cookie by applying Privacy and Security settings in your web browser
B.
Disable the Google cookie using Google Advanced Search settings on Google Search page
C.
Do not use Google but use another search engine Bing which will not collect and store your
search keywords
D.
Use MAC OS X instead of Windows 7. Mac OS has higher level of privacy controls by default.
A
You are scanning into the target network for the first time. You find very few conventional ports
open. When you attempt to perform traditional service identification by connecting to the open
ports, it yields either unreliable or no results. You are unsure of which protocols are being used.
You need to discover as many different protocols as possible.
Which kind of scan would you use to achieve this? (Choose the best answer)
A.
Nessus scan with TCP based pings.
B.
Nmap scan with the –sP (Ping scan) switch.
C.
Netcat scan with the –u –e switches.
D.
Nmap with the –sO (Raw IP packets) switch.
D
How many bits encryption does SHA-1 use?
A.
64 bits
B.
128 bits
C.
256 bits
D.
160 bits
D
What are two types of ICMP code used when using the ping command?
A.
It uses types 0 and 8.
B.
It uses types 13 and 14.
C.
It uses types 15 and 17.
D.
The ping command does not use ICMP but uses UDP.
A
In Trojan terminology, what is required to create the executable file chess.exe as shown below?
A.
Mixer
B.
Converter
C.
Wrapper
D.
Zipper
C
You are having problems while retrieving results after performing port scanning during internal
testing. You verify that there are no security devices between you and the target system. When
both stealth and connect scanning do not work, you decide to perform a NULL scan with NMAP.
The first few systems scanned shows all ports open.
Which one of the following statements is probably true?
A.
The systems have all ports open.
B.
The systems are running a host based IDS.
C.
The systems are web servers.
D.
The systems are running Windows
D
Syslog is a standard for logging program messages. It allows separation of the software that
generates messages from the system that stores them and the software that reports and analyzes
them. It also provides devices, which would otherwise be unable to communicate a means to
notify administrators of problems or performance.
What default port Syslog daemon listens on?
A.
242
B.
312
C.
416
D.
514
D
John has scanned the web server with NMAP. However, he could not gather enough information
to help him identify the operating system running on the remote host accurately.
What would you suggest to John to help identify the OS that is being used on the remote web
server?
A.
Connect to the web server with a browser and look at the web page.
B.
Connect to the web server with an FTP client.
C.
Telnet to port 8080 on the web server and look at the default page code.
D.
Telnet to an open port and grab the banner.
Explanation:
Most people don’t care about changing the banners presented by applications
listening to open ports and therefore you should get fairly accurate information when grabbing
banners from open ports with,for example,a telnet application.
D
This attack uses social engineering techniques to trick users into accessing a fake Web site and
divulging personal information. Attackers send a legitimate-looking e-mail asking users to update
their information on the company’s Web site, but the URLs in the e-mail actually point to a false
Web site.
A.
Wiresharp attack
B.
Switch and bait attack
C.
Phishing attack
D.
Man-in-the-Middle attack
C
An Nmap scan shows the following open ports, and nmap also reports that the OS guessing
results to match too many signatures hence it cannot reliably be identified:
21 ftp
23 telnet
80 http
443 https
What does this suggest?
A.
This is a Windows Domain Controller
B.
The host is not firewalled
C.
The host is not a Linux or Solaris system
D.
The host is not properly patched
D
Which of the following statements would NOT be a proper definition for a Trojan Horse?
A.
An authorized program that has been designed to capture keyboard keystroke while the user is
unaware of such activity being performed
B.
An unauthorized program contained within a legitimate program. This unauthorized program
performs functions unknown (and probably unwanted) by the user
C.
A legitimate program that has been altered by the placement of unauthorized code within it; this
code performs functions unknown (and probably unwanted) by the user
D.
Any program that appears to perform a desirable and necessary function but that (because of
unauthorized code within it that is unknown to the user) performs functions unknown (and
definitely unwanted) by the user
A
What port scanning method involves sending spoofed packets to a target system and then looking
for adjustments to the IPID on a zombie system?
A.
Blind Port Scanning
B.
Idle Scanning
C.
Bounce Scanning
D.
Stealth Scanning
E.
UDP Scanning
B
What is the correct command to run Netcat on a server using port 56 that spawns command shell
when connected?
A.
nc -port 56 -s cmd.exe
B.
nc -p 56 -p -e shell.exe
C.
nc -r 56 -c cmd.exe
D.
nc -L 56 -t -e cmd.exe
D
What port scanning method is the most reliable but also the most detectable?
A.
Null Scanning
B.
Connect Scanning
C.
ICMP Scanning
D.
Idlescan Scanning
E.
Half Scanning
F.
Verbose Scanning
B
SNMP is a connectionless protocol that uses UDP instead of TCP packets (True or False)
A.
true
B.
false
A
What does an ICMP (Code 13) message normally indicates?
A.
It indicates that the destination host is unreachable
B.
It indicates to the host that the datagram which triggered the source quench message will need
to be re-sent
C.
It indicates that the packet has been administratively dropped in transit
D.
It is a request to the host to cut back the rate at which it is sending traffic to the Internet
destination
C
TCP/IP Session Hijacking is carried out in which OSI layer?
A.
Datalink layer
B.
Transport layer
C.
Network layer
D.
Physical layer
B
Because UDP is a connectionless protocol: (Select 2)
A. UDP recvfrom() and write() scanning will yield reliable results
B.
It can only be used for Connect scans
C.
It can only be used for SYN scans
D.
There is no guarantee that the UDP packets will arrive at their destination
E.
ICMP port unreachable messages may not be returned successfully
D,E