Mock Exam (225 Questions) Flashcards

1
Q

Why can remote access VPNs not use Main Mode for IKE Phase-1 if the authentication method is pre-shared key?

A

Because pre-shared key authentication with Main Mode requires that the peer’s IP is known before the connection is established.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the blocksize of the DES encryption cipher?

A

64 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is this:
16:23:57.094021 IP 192.168.124.204.137 > 192.168.124.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST

A

A NetBIOS over TCP/IP name service broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which is the least secure encryption cipher of those listed below?

  1. DES
  2. Triple-DES
  3. MD5
  4. AES
  5. IDEA
A

DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which file in a user’s home directory controls the trust relationships for Berkeley R services?

A

.rhosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which operating system is most likely to be vulnerable to the TTYPROMPT vulnerability in the telnet service?

A

Solaris 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following algorithms could be used to negotiate a shared encryption key?

A

Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why might a tester insert the string "

alert(\"it works\")
" into a web form?
A

To check for a Cross-Site Scripting vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which protocols are associated with PPTP?

A

TCP port 1723 and IP protocol 47

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where are the encrypted passwords stored on a Solaris system?

A

/etc/shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements about the rwho protocol is true?

  1. rwho clients can query the rwho daemon. The protocol uses ONC/RPC.
  2. rwho clients can query the rwho daemon using TCP port 513.
  3. The rwho daemon sends regular broadcasts to UDP port 513, and listens to broadcasts from other systems.
  4. rwho clients can query the rwho daemon using UDP port 513.
  5. The rwho daemon sends regular broadcasts to TCP port 513, and listens to broadcasts from other systems.
A

The rwho daemon sends regular broadcasts to UDP port 513, and listens to broadcasts from other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How would you establish a null session to a windows host from a windows command shell?

A

NET USE \\hostname\ipc$ "" /u:""

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If the account lockout threshold is set to 5, how many incorrect password attempts will cause the built in administrator account to be locked out on a Windows 2003 system?

A

The built in administrator account will never be locked out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What effect would an octal umask of 0027 have on the permissions of new files?

A

Remove group write access, and remove all permissions for others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name given to the field concerned with the security implications of electronic eminations from communications equipment?

A

TEMPEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of these is not a valid IPv6 address?

  1. 2001:0db8:0:0::1428:57ab
  2. 2001:0db8:1428:57ab
A

2001:0db8:1428:57ab