Matt Walker - REAL PRE-ASSESSMENT Flashcards

1
Q

RPRE.1 A vendor is alerted of a newly discovered flaw in its software that presents a major vulnerability to systems. While working to prepare a fix action, the vendor releases a notice alerting the community of the discovered flaw and providing best practices to follow until the patch is available. Which of the following best describes the discovered flaw?

A. Input validation flaw
B. Shrink-wrap vulnerability
C. Insider vulnerability
D. Zero day

A

D
D. Zero day means there has been no time to work on a solution. The bad news is that the discovery by security personnel of the existing vulnerability doesn’t mean it just magically popped up—it means it has been there without the good guys’ knowledge and could have already been exploited. A, B, and C are incorrect. A is incorrect because input validation refers to verifying that a user’s entry into a form or field contains only what the form or field was designed to accept. B and C are incorrect because the terms shrink-wrap vulnerability and insider vulnerability are not valid so far as your exam is concerned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
RPRE.2A security professional applies encryption methods to communication channels. Which security control role is she attempting to meet? 
A.   Preventive 
B.   Detective 
C.   Defensive 
D.   Corrective
A

A
A. Controls fall into three categories: preventive, detective, and corrective. In this instance, encryption of data is designed to prevent unauthorized eyes from seeing it. Depending on the encryption used, this can provide for confidentiality and nonrepudiation and is most definitely preventive in nature.

B, C, and D are incorrect. B is incorrect because detective controls are designed to watch for security breaches and detect when they occur. C is incorrect because corrective controls are designed to fix things after an attack has been discovered and stopped. D is incorrect because defensive is not a control category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RPRE.3 Bob is working with senior management to identify the systems and processes that are critical for operations. As part of this business impact assessment, he performs calculations on various systems to place a value on them. On a certain server he discovers the following: • The server costs $2500 to purchase. •The server typically fails once every five years. •The salary for the technician to repair a server failure is $40 an hour, and it typically takes two hours to fully restore the server after a failure. •The accounting group has five employees paid at $25 an hour who are at a standstill during an outage. What is the ALE for the server?

A. 20%
B. $2830
C. $566
D. $500

A

C
C. ALE = ARO × SLE. To find the correct annualized loss expectancy, multiply the percentage of time it is likely to occur annually (annual rate of occurrence—in this case, 0.2 [1 failure / 5 years = 20%]) by the amount of cost incurred from a single failure (single loss expectancy—in this case, $80 [for the repair guy] + $250 [5 employees at $25 an hour for 2 hours] + $2500 (replacement of server) = $2830). ALE = 0.2 × $2830, so the ALE for this case is $566.

A, B, and D are incorrect. A is incorrect because 20% is the ARO for this scenario (1 failure / 5 years). B is incorrect because $2830 is the SLE for this scenario (repair guy cost + lost work from accounting guys + replacement of server, or $80 + $250 + $2500). D is incorrect because $500 would be the ALE if you did not take into account the technician and lost work production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RPRE.4 You’ve discovered a certain application in your environment that has been proven to contain vulnerabilities. Which of the following actions best describes avoiding the risk?

A. Remove the software from the environment.
B.Install all known security patches for the application.
C.Install brand-new software guaranteed by the publisher to be free of vulnerabilities.
D. Leave the software in place.

A

A
A. Removing the software or service that contains a vulnerability is described as avoiding the risk—if it’s not there to be exploited, there’s no risk.

B, C, and D are incorrect. B is incorrect because installing patches (or a new version) is an attempt to mitigate risk. C is incorrect because installing different software without vulnerabilities is called transferring risk (however, I don’t care what the software publisher says, the community will determine if there are vulnerabilities). D is incorrect because leaving the software in place is an example of accepting the risk: maybe there are security controls in place to where the chance of the vulnerabilities being exploited is so small you’re willing to just accept that they exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
RPRE.5 James is a member of a pen test team newly hired to test a bank’s security. He begins searching for IP addresses the bank may own, using public records on the Internet, and he also looks up news articles and job postings to discover information that may be valuable. In what phase of the pen test is James working? 
A.   Reconnaissance 
B.   Pre-attack 
C.   Assessment 
D.   Attack 
E.   Scanning
A

B
B. The pre-attack phase (a.k.a. the preparation phase) is where all this activity takes place—including the passive information gathering performed by James in this example. This would be followed by the attack and post-attack phases.

A, C, and D are incorrect.

A and D are incorrect because reconnaissance and scanning are part of the ethical hacking phases (reconnaissance, scanning/enumeration, gaining access, maintaining access, and clearing tracks).

C is incorrect because assessment is akin to the attack phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
RPRE.6 Enacted in 2002, this U.S. law requires every federal agency to implement information security programs, including significant reporting on compliance and accreditation. Which of the following is the best choice for this definition? 
A.   FISMA 
B.   HIPAA 
C.   NIST 800-53 
D.   OSSTMM
A

A
A. FISMA has been around since 2002 and was updated in 2014. It gave certain information security responsibilities to NIST, OMB, and other government agencies, and declared the Department of Homeland Security (DHS) as the operational lead for budgets and guidelines on security matters.

B, C, and D are incorrect. These do not match the description.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RPRE.7 You are examining a Wireshark capture. Which of the following MAC addresses would indicate a broadcast packet?

A. AA:AA:AA:AA:AA:AA
B. FF:FF:FF:FF:FF:FF
C. 11:11: 11:11: 11:11
D. 99:99: 99:99: 99:99

A

B
B. You’ll see a few base-level network knowledge questions peppered throughout the exam, and this is one example. A NIC seeing a MAC of FF:FF:FF:FF:FF:FF knows the packet is broadcast in nature and passes it up the stack for processing.

A, C, and D are incorrect. These addresses do not match broadcast frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
RPRE.8 Which Google operator is the best choice in searching for a particular string in the website’s title? 
A.   intext: 
B.   inurl: 
C.   site: 
D.   intitle:
A

D
D. Google hacking refers to manipulating a search string with additional specific operators to search for valuable information. The intitle: operator will return websites with a particular string in their title. Website titles can contain legitimate descriptions of the page, author information, or a list of words useful for a search engine.

A, B, and C are incorrect. A is incorrect because the intext: operator looks for pages that contain a specific string in the text of the page body. B is incorrect because the inurl: operator looks for a specific string within the URL. C is incorrect because the site: operator limits the current search to only the specified site (instead of the entire Internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
RPRE.9 An ethical hacker begins by visiting the target’s website and then peruses social networking sites and job boards looking for information and building a profile on the organization. Which of the following best describes this effort? 
A.   Active footprinting 
B.   Passive footprinting 
C.   Internet footprinting 
D.   Sniffing.
A

B
B. Footprinting competitive intelligence is a passive effort because of competitive intelligence being open and accessible to anyone. Passive footprinting is an effort that doesn’t usually put you at risk of discovery. A, C, and D are incorrect. A is incorrect because this is not active footprinting, meaning no internal targets have been touched and there is little to no risk of discovery. C is incorrect because Internet footprinting isn’t a legitimate term to commit to memory. D is incorrect because sniffing is irrelevant to this question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
RPRE.10 Internet attackers—state sponsored or otherwise—often discover vulnerabilities in a service or product but keep the information quiet and to themselves, ensuring the vendor is unaware of the vulnerability, until the attackers are ready to launch an exploit. Which of the following best describes this? 
A.   Zero day 
B.   Zero hour 
C.   No day 
D.   Nada sum
A

A
A. A zero-day attack is one carried out on a vulnerability the good guys didn’t even know existed. The true horror of this attack is that you do not know about the vulnerability until it’s far too late.

B, C, and D are incorrect. These answers are not legitimate terms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
RPRE.11 The organization has a DNS server out in the DMZ and a second one internal to the network. Which of the following best describes this DNC configuration? 
A.   Schematic DNS 
B.   Dynamic DNS 
C.   DNSSEC 
D.   Split DNS
A

D
D. Split DNS is recommended virtually everywhere. Internal hosts may need to see everything internal, but external hosts do not. Keep internal DNS records split away from external ones, as there is no need for anyone outside your organization to see them.

A, B, and C are incorrect. These answers are all distractors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
RPRE.12 Search engines assist users in finding the information they want on the Internet. Which of the following is known as the hacker’s search engine, explicitly allowing you to find specific types of computers (for example, routers or servers) connected to the Internet? 
A.   Whois 
B.   Shodan 
C.   Nslookup 
D.   Burp Suite
A

B
B. Shodan allows users to search for very specific types of hosts, which can be very helpful to attackers—ethical or not.

A, C, and D are incorrect.
A is incorrect because whois provides registrar and technical POC information.

C is incorrect because nslookup is a command-line tool for DNS lookups.

D is incorrect because Burp Suite is a website/application hacking tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RPRE13. Which of the following methods correctly performs banner grabbing with telnet on a Windows system?

A. telnet 80
B. telnet 80
C. telnet 80 -u
D. telnet 80 -u

A

A
A. Telnetting to port 80 will generally pull a banner from a web server. You can telnet to any port you want to check, for that matter, and ideally pull a port; however, port 80 just seems to be the one used on the exam the most.

B, C, and D are incorrect. These are all bad syntax for telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
RPRE.14 Which TCP flag instructs the recipient to ignore buffering constraints and immediately send all data? 
A.   URG 
B.   PSH 
C.   RST 
D.   BUF
A

B
B. It may look like an urgent request, but don’t fall for it—the URG flag isn’t apropos here; the PSH flag is designed for these scenarios.

A, C, and D are incorrect.

A is incorrect because the URG flag is used to inform the receiving stack that certain data within a segment is urgent and should be prioritized (not used much by modern protocols).

C is incorrect because the RST flag forces a termination of communications (in both directions).

D is incorrect because BUF is not a TCP flag.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
RPRE.15 Which of the following correctly describes the TCP three-way handshake? 
A.   SYN, ACK, SYN/ACK 
B.   SYN, SYN/ACK, ACK 
C.   ACK, SYN, ACK/SYN 
D.   ACK, ACK/SYN, SYN
A

B
B. This is bedrock knowledge you should already have memorized from Networking 101 classes. TCP starts a communication with a synchronize packet (with the SYN flag set). The recipient acknowledges this by sending both the SYN and ACK flags. Finally, the originator acknowledges communications can begin with an ACK packet.

A, C, and D are incorrect. These answers do not have the correct three-way handshake order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RPRE.16 You are examining the results of a SYN scan. A port returns a RST/ACK. What does this mean?

A. The port is open.
B. The port is closed.
C. The port is filtered.
D. Information about this port cannot be gathered.

A

B
B. Think about a TCP handshake—SYN, SYN/ACK, ACK—and then read this question again. Easy, right? In a SYN scan, an open port is going to respond with a SYN/ACK, and a closed one is going to respond with a RST/ACK.

A, C, and D are incorrect. A is incorrect because the return response indicates the port is closed. C is incorrect because a filtered port likely wouldn’t respond at all. D is incorrect because an open port would respond with a SYN/ACK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RPRE.17 You want to run a reliable scan but remain as stealthy as possible. Which of the following nmap commands best accomplishes your goal?

A. nmap -sN targetIPaddress
B. nmap -sO targetIPaddress
C. nmap -sS targetIPaddress
D. nmap -sT targetIPaddress

A

C
C. A full-connect scan would probably be best, provided you run it slowly. However, given the choices, a half-open scan, as defined by this nmap command line, is the best remaining option.

A, B, and D are incorrect. A is incorrect because a null (-sN) scan probably won’t provide the reliability asked for because it doesn’t work on Windows hosts at all. B is incorrect because an operating system (-sO) scan would prove too noisy. D is incorrect because a full scan (-sT) would provide reliable results, but without a timing modifier to greatly slow it down, it will definitely be seen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
RPRE.18 You are examining a host with an IP address of 65.93.24.42/20, and you want to determine the broadcast address for the subnet. Which of the following is the correct broadcast address for the subnet? 
A.   65.93.24.255 
B.   65.93.0.255 
C.   65.93.32.255 
D.   65.93.31.255 
E.   65.93.255.255
A

D
D. If you view the address 65.93.24.42 in binary, it looks like this: 01000001.01011101.00011000.00101010. The subnet mask given (/20) tells you only the first 24 bits count as the network ID (which cannot change if we are to stay in the same subnet), and the remaining 12 bits belong to the host. Turning off all the host bits (after the 20th bit) gives you your network ID: 01000001.01011101.00010000.00000000 (52.93.16.0/20). Turning on all the host bits gives you our broadcast address: 01000001.01011101.00011111.11111111 (65.93.31.255/20).

A, B, and C are incorrect. These answers do not match the broadcast address for this subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
RPRE.19 Angie captures traffic using Wireshark. Which filter should she apply to see only packets sent from 220.99.88.77? 
A.   ip = 220.99.88.77 
B.   ip.src == 220.99.88.77 
C.   ip.equals 220.99.88.77 
D.   ip.addr == 220.99.88.77
A

B
B. The ip.src== xxxx filter tells Wireshark to display only those packets with the IP address xxxx in the source field.

A, C, and D are incorrect. These are incorrect Wireshark filters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RPRE.20 A systems administrator notices log entries from a host named MATTSYS (195.16.88.12) are not showing up on the syslog server (195.16.88.150). Which of the following Wireshark filters would show any attempted syslog communications from the machine to the syslog server?
A. tcp.dstport==514 && ip.dst==195.16.88.150
B. tcp.srcport==514 && ip.src==195.16.88.12
C. tcp.dstport==514 && ip.src==195.16.88.12
D. udp.dstport==514 && ip.src==195.16.88.12

A

D
D. This Wireshark filter basically says, “Show all packets with a destination port of 514 (generally associated with—and some would say defaulting as—syslog) coming from MATTSYS (whose IP address is 195.16.88.12).”

A, B, and C are incorrect. They do not match the correct syntax.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
RPRE.21 Which IoT communication model allows the data from IoT devices to be accessed by a third party? 
A.   Device-to-Device 
B.   Device-to-Cloud 
C.   Device-to-Gateway 
D.   Back-End Data Sharing
A

D
D. In the Back-End Data-Sharing model, a third party is allowed access to data from the devices. The IoT devices upload data to the cloud, where the third party can collect and analyze it.

A, B, and C are incorrect. These are all valid IoT communication models; however, they do not match the criteria of data sharing with third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RPRE.22 A pen tester connects a laptop to a switch port and enables promiscuous mode on the NIC. He then turns on Wireshark and leaves for the day, hoping to catch interesting traffic over the next few hours. Which of the following statements is true regarding this scenario? (Choose all that apply.)

A.The packet capture will provide the MAC addresses of other machines connected to the switch.
B.The packet capture will provide only the MAC addresses of the laptop and the default gateway.
C.The packet capture will display all traffic intended for the laptop.
D.The packet capture will display all traffic intended for the default gateway.

A

A, C
A, C. Switches are designed to filter traffic—that is, they send traffic intended for a destination MAC—to only the port that holds the MAC address as an attached host. The exceptions, however, are broadcast and multicast traffic, which get sent out every port. Because ARP is broadcast in nature, all machines’ ARP messages would be viewable.

B and D are incorrect. The switch will filter traffic to the laptop, and MAC addresses will be available from the broadcast ARPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RPRE.23 Which of the following statements best describes port security?

A.It stops traffic sent to a specified MAC address from entering a port.
B.It allows traffic sent to a specific MAC address to enter a port.
C.It stops traffic from a specific MAC from entering a port.
D.It allows traffic from a specific MAC address to enter to a port.

A

C
C. In ARP poisoning, the bad guy keeps injecting a bad IP-to-MAC mapping in order to have traffic intended for the target go somewhere else.

A, B, and D are incorrect. None of these answers correctly describes ARP poisoning. Yes, it’s true an attacker may be sending thousands of ARP packets through a switch to the target, but that in and of itself does not ARP poisoning make.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RPRE.24 Which of the following statements best describes port security?

A.It stops traffic sent to a specified MAC address from entering a port.
B.It allows traffic sent to a specific MAC address to enter a port.
C.It stops traffic from a specific MAC from entering a port.
D.It allows traffic from a specific MAC address to enter to a port.

A

D
D. This is exceedingly confusing on purpose—because it’s how you’ll see it on the exam. Port security refers to a security feature on switches that allows an administrator to manually assign MAC addresses to a specific port; if the machine connecting to the port does not use that particular MAC, it isn’t allowed to even connect. Port security works on source addresses, so you’re automatically looking at “from,” not “to.” In other words, it is specifically allowing access (entering a port) to a defined MAC address—think of it as a whitelist. In truth, this type of implementation turns out to be a bit of a pain for the network staff, so most people don’t use it that way. In most cases, port security simply restricts the number of MAC addresses connected to a given port. Suppose your Windows 10 machine runs six VMs for testing, each with its own MAC. As long as your port security allows for at least seven MACs on the port, you’re in good shape.

A, B, and C are incorrect. A and B are incorrect because port security works on source addressing. Answer C is incorrect because it’s not stopping a specific MAC from connecting; it’s only allowing a specific one to do so.

25
Q
RPRE.26 Which of the following commands would be useful in adjusting settings on the built-in firewall on a Windows machine? 
A.   netstat 
B.   netsh 
C.   sc 
D.   ntfw
A

B
B. Netsh is “a command-line scripting utility that allows you to, either locally or remotely, display or modify the network configuration of a computer that is currently running” (KB article 947709). Typing netsh at the command line then allows you to step into various “contexts” for adjusting several network configuration options, including the firewall. Typing a question mark shows all available commands at the context you are in. You can also execute the command without stepping into each context. For example, typing netsh firewall show config on pre-Windows 10 boxes will show the configuration of the firewall. Windows 10 has updated this command to netsh advfirewall firewall show.

A, C, and D are incorrect. A is incorrect because netstat is a great tool for viewing ports and what’s happening to them on the device. C is incorrect because sc is service control. D is incorrect because ntfw isn’t a valid command-line tool.

26
Q

RPRE.27 Which SID indicates the true administrator account on the Windows machine?
A. S-1-5-31-1045337334-12924807993-5683276715-1500
B. S-1-5-31-1045337334-12924807993-5683276715-1001
C. S-1-5-31-1045337334-12924807993-5683276715-501
D. S-1-5-31-1045337334-12924807993-5683276715-500

A

D
D. A security identifier (SID) has five components, each one providing specific information. The last component—the relative identifier (RID)—provides information on the type of account. The RID 500 indicates the true administrator account on the machine.

A, B, and C are incorrect. A and B are incorrect because RID values starting at 1000 refer to standard user accounts. C is incorrect because the 501 RID indicates the built-in guest account.

27
Q

RPRE.28 Which of the following statements is true regarding LM hashes?

A.If the left side of the hash begins with 1404EE, the password is less than eight characters.
B.If the right side of the hash ends with 1404EE, the password is less than eight characters.
C.There is no way to tell whether passwords are less than eight characters because hashes are not reversible.
D.There is no way to tell whether passwords are less than eight characters because each hash is always 32 characters long.

A

B
B. In a password less than eight characters, LM hashes will always have the right side of the hash the same, ending in 1404EE, because of the method by which LM performs the hash. A, C, and D are incorrect.

A is incorrect because the left side of each hash will always be different and indicates nothing.
Answers C and D are incorrect because the hash value can tell you password length.

28
Q
RPRE.29 Which password-cracking method usually takes the most time and uses the most resources? 
A.   Hybrid 
B.   Dictionary 
C.   Brute force 
D.   Botnet
A

C
C. Brute-force attacks attempt every conceivable combination of letters, numbers, characters, and length in an attempt to find a match. Given you’re starting from scratch, it follows you’d need a lot of time and a lot of resources. As an aside, the increase in processing power of systems and the ability to combine multiple systems together to work on problems cuts down on the time portion of this cracking technique fairly significantly. A, B, and D are incorrect. A and B are incorrect because both hybrid and dictionary attacks have a word list to work with and can run through it fairly quickly (in computing time, that is). D is incorrect because a botnet is a series of zombie systems set up by an attacker to carry out duties.

29
Q

RPRE.30 Which of the following actions is the best choice for protection against privilege escalation vulnerabilities?

A. Ensure drivers are appropriately signed.
B.Set admin accounts to run on least privilege.
C. Make maximum use of automated services.
D. Ensure services run with least privilege.

A

D
D. Ensuring your services run with least privilege (instead of having all services run at admin level) can help in slowing down privilege escalation.

A, B, and C are incorrect.

A is incorrect because ensuring drivers are in good shape is good practice but doesn’t have a lot to do with privilege escalation prevention.

B is incorrect because admin accounts don’t run with least privilege; they’re admin accounts for a reason.

C is incorrect because automating services may save time, but it doesn’t slow down hacking efforts.

30
Q

RPRE.31 During a pen test, you notice VoIP traffic is traversing the subnet. Which of the following tools could be used to decode a packet capture and extract voice conversations?

A. Black Widow
B. Netcat
C. Nmap
D. Cain

A

D
D. Cain (and Abel) can be used for various tasks, including extracting voice from VoIP captures.

A, B, and C are incorrect. These tools do not perform the task listed.

A is incorrect because Black Widow copies websites to your system for later review.

B is incorrect because netcat has many functions but is mostly known for its use in creating backdoor access to compromised systems.

C is incorrect because nmap is probably the best-known port scanner in the world.

31
Q

RPRE.32 A pen tester enters the following command on a Windows 7 system: netsh firewall show config What should be displayed in return?

A. Settings of the built-in firewall
B. An authentication screen for firewall configuration access
C. Route mapping to the nearest firewall
D. None of the above

A

A
A. The netsh command can reveal a variety of information. In this example, it is used to display the Windows firewall settings. On Windows 10 systems, the command has been deprecated. To see firewall ruleset on a Windows 10 box, try netsh advfirewall firewall show rule name=all status=enabled.

B, C, and D are incorrect. These answers do not accurately reflect the command.

32
Q

RPRE.33 Which of the following statements is true regarding Kerberos?

A.Kerberos makes use of UDP as a transport protocol.
B.Kerberos makes use of TCP as a transport protocol.
C.Kerberos uses port 88 for the transmission of data.
D.Kerberos makes use of both symmetric and asymmetric encryption techniques.
E. All the above.

A

E
E. Kerberos makes use of both symmetric and asymmetric encryption technologies to securely transmit passwords and keys across a network. The entire process consists of a key distribution center (KDC), an authentication service (AS), a ticket granting service (TGS), and the ticket granting ticket (TGT). It can make use of both TCP and UDP and runs over port 88 by default.

A, B, C, and D are incorrect. Because all these are true statements, none can individually be the correct answer.

33
Q

RPRE.34 The < character opens an HTML tag, and the > character closes it. In some web forms, input validation may deny these characters to protect against XSS. Which of the following represent the HTML entities used in place of these characters? (Choose two.)

A.   < 
B.   > 
C.   &amp; 
D.   ® 
E.   
A

A,B
A, B. Whether you’re attempting to bypass input validation or just having things appear the way you want them to on a web page, HTML entities can be useful. The less-than sign () equates to >. You can also use their respective numbered equivalents (< and >).

C, D, and E are incorrect.
C is incorrect because & equates to the ampersand (&) character.
D is incorrect because ® equates to the registered symbol, ®.
E is incorrect because is a nonbreaking space.

34
Q
RPRE.35  An attacker discovers a form on a target organization’s website. He interjects some simple JavaScript into one of the form fields instead of the username. Which attack is he carrying out? 
A.   XSS 
B.   SQL injection 
C.   Buffer overflow 
D.   Brute force
A

A
A. Using a script entry in a web form field is cross-site scripting.

B, C, and D are incorrect. B and C are incorrect because this entry does not indicate SQL injection or buffer overflow. D is incorrect because brute force refers to a password-cracking effort.

35
Q

RPRE.36 An attacker enters the following into a web form: ‘or 1=1 –. Which attack is being attempted?

A. XSS
B. Brute force
C. Parameter manipulation
D. SQL injection

A

D
D. If you missed this one, please consider taking a break or just starting your study process over again—you’re obviously too tired to concentrate or you’ve never seen this before and are attempting to memorize your way to exam success. This question displays the classic SQL injection example that you’ll see on every single practice test you’ll take on the subject. A, B, and C are incorrect. A is incorrect because XSS is cross-site scripting and involves inserting a script into a web form entry field to produce an outcome. B is incorrect because brute force is a password-cracking technique, using all possible variants to match the encrypted value. C is incorrect because parameter manipulation refers to any parameter within communications being manipulated to force a desired outcome and is most likely displayed on the exam within a URL.

36
Q

RPRE.37 Which OWASP top ten vulnerability for IoT deals with insecure or weak passwords?
A. Insufficient Authentication/Authorization
B. Insecure Network Services
C. Insecure Cloud Interface
D. Insecure Software/Firmware

A

A
A. Insufficient Authentication and Authorization is listed second on OWASP’s IoT vulnerability top ten list. Per the list, “Insufficient Authentication refers to using weak credentials suck as an insecure or weak password, which offers poor security.”

B, C, and D are incorrect.
B is incorrect because Insecure Network Services refers to those services prone to attacks like buffer overflows.
C is incorrect because Insecure Cloud Interface refers to things like insufficient authentication configuration of the cloud interface itself.
D is incorrect because Insecure Software/Firmware, amazingly enough, refers to the software and firmware versions, and associated security, themselves.

37
Q

RPRE.38 After a recent attack, log files are reviewed by the IR team to determine the attack scope, success or failure, and lessons learned. Consider the following entry: SELECT username, password FROM users; Which of the following statements best describes the result of this command query?

A.The command deletes username and password fields from a table named “users.”
B.The command adds username and password fields to a table named “users.”
C.The command displays the contents of the username and password fields stored in the table named “users.”
D. The command will not produce any results.

A

C
C. Walking through this command, we see that SELECT retrieves information from a database, and the username and password fields are designated as what to select. Then, using the FROM command, the table holding the fields is identified.

A, B, and D are incorrect. A is incorrect because DROP TABLE would be used to delete an entire table. B is incorrect because ALTER TABLE can add or remove individual fields (columns), among other things. D is incorrect because the entry shown is a valid command.

38
Q

RPRE.39 Which jailbreaking method does not retain the patched kernel after reboot but does leave the software on the device, allowing for future jailbreak activities?

A. Tethered jailbreaking
B. Semi-tethered jailbreaking
C. Untethered jailbreaking
D. Rooting

A

B
B. In semi-tethered jailbreaking, a reboot no longer retains the patched kernel; however, the software has already been added to the device. Therefore, if admin privileges are required, the installed jailbreaking tool can be used.

A, C, and D are incorrect.

A and C are incorrect because a reboot removes all jailbreaking patches in tethered mode, and in untethered mode, the kernel will remain patched (that is, jailbroken) after reboot, with or without a system connection.

D is incorrect because rooting is associated with Android devices, not iOS.

39
Q

RPRE.40 Which of the following statements best defines smishing?

A.It is sending SMS texts to a user in an effort to trick them into downloading malicious code.
B. It is sniffing Bluetooth connections.
C.It is hijacking Bluetooth connections to send text messages.
D. It is rooting an Android device.

A

A
A. Smishing comes from cramming SMS (texting) and phishing together. “Smishing,” get it? The idea is the same as with phishing, except you use text messaging to trick users into downloading stuff.

B, C, and D are incorrect. These definitions do not apply to smishing.

40
Q

RPRE.41 XenMobile, MaaS360, AirWatch, and MobiControl are all examples of which kind of security solution?

A. 802.1x
B. BYOD
C. MDM
D. CCMP

A

C
C. Mobile Device Management is an effort to provide at least some organizational security thought to the maddening problem of mobile devices on the network. It attempts to monitor, manage, and secure the mobile devices (and associated service providers and mobile operating systems) in use in the organization. Much like group policy and such in the Microsoft Windows world, MDM helps in pushing security policies, application deployment, and monitoring of mobile devices. Solutions include XenMobile, MaaS360, AirWatch, and MobiControl.

A, B, and D are incorrect.
is incorrect because 802.1x is the wireless standards family.
B is incorrect because, although BYOD sounds like fun, it’s really “Bring Your Own Device” (a policy allowing personal mobile devices on organizational networks).
D is incorrect because CCMP is a function inside WPA2.

41
Q
RPRE.42 Which of the following is a passive wireless discovery tool? 
A.   NetStumbler 
B.   Aircrack 
C.   Kismet 
D.   Netsniff
A

C
C. Kismet works as a passive network discovery tool, without using packet interjection to gather information. Kismet also works by channel hopping to discover as many networks as possible and has the ability to sniff packets and save them to a log file, readable by Wireshark or tcpdump.

A, B, and D are incorrect. A is incorrect because NetStumbler is an active discovery tool. B is incorrect because Aircrack is a WEP-cracking program. D is incorrect because Netsniff is a false term.

42
Q
RPRE.43 Which of the following provides the integrity method for WPA2? 
A.   RC4 
B.   CCMP 
C.   AES 
D.   802.1x
A

B
B. As good as WPA was, there were tiny flaws to be exploited in TKIP. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) was created to fix those and is the integrity method used by Wi-Fi Protected Access 2 (WPA2).

A, C, and D are incorrect.

A and C are incorrect because RC4 and AES are encryption algorithms (AES is used in WPA, by the way).
D is incorrect because 802.1x is the standards family wireless comes from.

43
Q

RPRE.44 An attacker performs reconnaissance and learns the organization’s SSID. He places an access point inside a closet in order to trick normal users into connecting it and then redirect them to malicious sites. Which of the following terms is used to describe this attack?

A. Replay attack
B. Evil twin attack
C. Closet AP attack
D. WEP nap attack

A

B
B. A rogue access point is also known as an evil twin. Usually they’re discovered quickly; however, there are lots of organizations that don’t regularly scan for them.

A, C, and D are incorrect.

A is incorrect because a replay attack occurs when communications (usually authentication related) are recorded and replayed by the attacker.

C and D are incorrect because closet AP and WEP nap aren’t legitimate terms.

44
Q
RPRE.45 Which attack can be mitigated by configuring the web server to send random challenge tokens? 
A.   XSS 
B.   Buffer overflow 
C.   CSRF 
D.   Form field manipulation
A

C
C. In a CSRF attack, a user is already on a validated session with the target server. He then opens a link sent by the attacker to a malicious site. If things are set appropriately, the attacker can then send requests to the user’s valid server connection. Using random challenge tokens ensures each request is actually coming from the user’s already-established session.

A, B, and D are incorrect. These attacks will not be affected by random challenge tokens.

45
Q

RPRE.46 You deploy cloud services such that they are provided over a network open for public use. Which of the following best describes your cloud deployment?

A. Private
B. Community
C. Public
D. Hybrid

A

C
C. A public cloud model is one where services are provided over a network that is open for public use (like the Internet). Public cloud is generally used when security and compliance requirements found in large organizations aren’t a major issue.

A, B, and D are incorrect. A is incorrect because private clouds are…private, and used for a single tenant. B is incorrect because community is a deployment model where the infrastructure is shared by several organizations, usually with the same policy and compliance considerations. D is incorrect because hybrid is a deployment model containing two or more methods of deployment.

46
Q
RPRE.47 In NIST cloud architecture, which role acts as the organization that has the responsibility of transferring the data? 
A.   Cloud carrier 
B.   Cloud consumer 
C.   Cloud auditor 
D.   Cloud broker
A

A
A. The cloud carrier is the organization that has the responsibility of transferring the data, akin to the power distributor for the electric grid.

B, C, and D are incorrect. B is incorrect because the cloud consumer is the individual or organization that acquires and uses cloud products and services. C is incorrect because the cloud auditor is the independent assessor of cloud service and security controls. D is incorrect because the cloud broker acts to manage the use, performance, and delivery of cloud services as well as the relationships between providers and subscribers.

47
Q

RPRE.48 Which of the following provides visibility and security controls for servers in a cloud?

A. CloudPassage Halo
B. Metasploit
C. AWSExploit
D. CloudInspect

A

A
A. CloudPassage Halo (https://www.cloudpassage.com/products/) “provides instant visibility and continuous protection for servers in any combination of data centers, private clouds, and public clouds.”

B, C, and D are incorrect. B is incorrect because Metasploit is a framework for delivering exploits. C is incorrect because AWSExploit is not a legitimate tool. D is incorrect because CloudInspect was designed for AWS cloud subscribers and runs as an automated, all-in-one testing suite specifically for your cloud subscription.

48
Q

RPRE.49 Which of the following best describes crypters?

A.Software tools that use a combination of encryption and code manipulation to render malware as undetectable to antivirus software
B.Software tools that use compression to pack the malware executable into a smaller size
C.Software that appears to perform a desirable function for the user prior to running or installing it but instead performs a function that steals information or otherwise harms the system
D. Software that hides data in other files

A

A
A. Crypters are software tools that use a combination of encryption and code manipulation to render malware as undetectable to AV and other security-monitoring products (in Internet lingo, they’re referred to as fud, for “fully undetectable”).

B, C, and D are incorrect. B is incorrect because packers are a variant of crypters and use compression to pack the malware executable into a smaller size. C is incorrect because Trojans look innocent but turn malicious after installation. D is incorrect because steganography tools hide data in existing image, video, or audio files.

49
Q
RPRE.50 Which command displays all connections and listening ports in numerical form? 
A.   netstat -a localhost -n 
B.   netstat -an 
C.   netstat -r 
D.   netstat -s
A

B
B. Netstat provides a lot of good information on your machine. The -a option is for all connections and listening ports. The -n option puts them in numerical order.

A, C, and D are incorrect. A is incorrect because netstat -a localhost -n is incorrect syntax. C is incorrect because netstat -r displays the route table. D is incorrect because netstat -s displays per-protocol statistics.

50
Q

RPRE.51 Within a biometric system, which of the following describes a circumstance where legitimate users are denied access to resources due to system errors or inaccurate readings?

A. False positive
B. False negative
C. False acceptance rate
D. Crossover error rate

A

B
B. A false negative occurs when a person is denied access even though he is a legitimate user. A, C, and D are incorrect. A is incorrect because a false positive occurs when a user is allowed access when he is not legitimate. C and D are incorrect

51
Q

RPRE.52 Which of the following best matches the POODLE attack?

A. MITM
B. DoS
C. DDoS
D. XSS

A

A
A. In a POODLE attack, the man in the middle interrupts all handshake attempts by TLS clients, forcing a degradation to a vulnerable SSL version. Because many browsers would revert back to SSL 3.0 for backward compatibility and TLS handshakes “walked down” the connection until a usable one was found, attackers could interrupt the handshake and make it go all the way down to SSL 3.0

B, C, and D are incorrect. B and C are incorrect because POODLE is not a denial-of-service attack of any kind. D is incorrect because cross-site scripting has nothing to do with POODLE.

52
Q

RPRE.53 An attacker uses a Metasploit auxiliary exploit to send a series of small messages to a server at regular intervals. The server responds with 64 bytes of data from its memory. Which of the following attacks is being described?

A. POODLE
B. Heartbleed
C. FREAK
D. DROWN

A

B
B. Heartbleed takes advantage of the data-echoing acknowledgement heartbeat in SSL. OpenSSL version 1.0.1 through version 1.0.1f are vulnerable to this attack.

A, C, and D are incorrect.
A is incorrect because the original variant of POODLE was a man-in-the-middle attack, where the bad guy exploits vulnerabilities in the TLS security protocol fallback mechanism.
C is incorrect because FREAK (Factoring Attack on RSA-EXPORT Keys) is a technique used in man-in-the-middle attacks to force the downgrade of RSA keys to weaker lengths.
D is incorrect because DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) allows attackers to break SSLv2 encryption (left on sites for backward compatibility) and read or steal sensitive communications.

53
Q

RPRE.54 Which of the following would most likely be used to encrypt an entire hard drive?

A. PGP
B. TLS
C. SSH
D. SSL

A

A
A. Pretty Good Privacy (PGP) uses an asymmetric encryption method to encrypt information. Although generally associated with e-mail, it can encrypt virtually anything. PGP uses public/private key encryption.

B, C, and D are incorrect. B and D are incorrect because TLS and SSL are encryption algorithms for network traffic. C is incorrect because SSH is an encrypted version of telnet.

54
Q

RPRE.55 Which of the following could be a potentially effective countermeasure against social engineering?

A. User education and training
B. Strong security policy and procedure
C. Clear operational guidelines
D.Proper classification of information and individuals’ access to that information
E. All of the above

A

E
E. Social engineering can’t ever be fully contained—after all, we’re only human. However, these options present good steps to take in slowing it down. A properly trained employee, who not only knows the policies and guidelines but agrees with and practices them, is a tough nut to crack. Assigning classification levels helps by restricting access to specific data, thereby limiting (ideally) the amount of damage of a successful social engineering attack.

A, B, C, and D are incorrect individually because they all apply.

55
Q

RPRE.56 Which of the following represents the highest risk to an organization?

A. Black hat
B. Gray hat
C. White hat
D. Disgruntled employee

A

D
D. It’s bad enough we have to worry about the external hackers trying to break their way into a network, but what about all the folks we already let onto it? Disgruntled employees are a serious threat because they already have connectivity and, depending on their job, a lot of access to otherwise protected areas.

A, B, and C are incorrect. A is incorrect because a black hat is an external, malicious attacker. B is incorrect because a gray hat doesn’t work under an agreement but might not be malicious. C is incorrect because a white hat is an ethical hacker.

56
Q

RPRE.57 Jill receives an e-mail that appears legitimate and clicks the included link. She is taken to a malicious website that steals her login credentials. Which of the following best describes this attack?

A. Phishing
B. Javelin
C. Wiresharking
D. Bait and switch

A

A
A. Phishing is the act of crafting e-mails to trick recipients into behavior they would not otherwise complete. Usually the phishing e-mail contains a link to a malicious site or even an embedded piece of malware.

B, C, and D are incorrect. These answers are not legitimate attacks and do not apply here.

57
Q

RPRE.58 Bill is asked to perform an assessment but is provided with no knowledge of the system other than the name of the organization. Which of the following best describes the test he will be performing?

A. White box
B. Gray box
C. Black box
D. None of the above

A

C
C. While there may be some argument about the real-world version of a black-box test, as far as your exam goes, it is an assessment without any knowledge provided about the target.

A, B, and D are incorrect. A and B are incorrect because white-box and gray-box tests both provide information about the target (white is all of it, gray some of it). D is incorrect because C is the correct answer.

58
Q

RPRE.59 OWASP provides a testing methodology. In it, which of the following is provided to assist in securing web applications?
A. COBIT
B.A list of potential security flaws and mitigations to address them
C. Web application patches
D. Federally recognized security accreditation

A

B
B. OWASP provides an inside look at known web application vulnerabilities to assist developers in creating more secure environments. The following is from the OWASP website: “Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. OWASP does not endorse or recommend commercial products or services, allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide.”

A, C, and D are incorrect. A is incorrect because COBIT is a framework for IT governance and control provided by ISACA. (Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only to reflect the broad range of IT governance professionals

59
Q

RPRE.60 Which of the following best describes a red team?

A. Security team members defending a network
B. Security team members attacking a network
C.Security team members with full knowledge of the internal network
D.Security team members dedicated to policy audit review

A

B
B. Red teams are on offense. They are employed to go on the attack, simulating the bad guys out in the world trying to exploit anything they can find. They typically have little to no knowledge of the target to start with.

A, C, and D are incorrect. A and C are incorrect because blue teams work on the defensive side and have internal knowledge of the environment. D is incorrect because policy audit review is nothing more than a distractor here.