Practice Questions Flashcards
The CIA model of security consists of Confidentiality, Integrity and Availability. Which of the following is also a highly desirable security feature of a networked environment?
A Security Cleared Employees
B Connectivity
C Authenticity
D IPv6
C - Authenticity
Which of the following tools would you not use for packet capturing on a IPv4 TCP/IP network?
A Tcpdump
B Wireshark
C Nikto
D SmartSniff
C - Nikto
With the Domain Name System (DNS), the PTR record is used to?
A Refer to a Mail Server
B Map an name to an IP address
C Express a zone of control
D Map an IP address to a name
D - Map an IP address to a name
Most ARP poisoning tools work by creating which of the following?
A A fake ARP request that is a unicast.
B A fake ARP request that is a multicast.
C A fake ARP reply that is a unicast.
D A fake ARP reply that is a broadcast.
B - A fake ARP request that is a multicast.
With the Domain Name System (DNS), the MX record is used to?
A Refer to a Mail Server
B Express host information
C Express a zone of control
D To define an name server for a zone
A - Refer to a Mail Server
Which of the following best describes freely available material on the internet, which may be useful to an attacker?
A Open source intelligence (OSINT)
B Available Access Data
C Human Intelligence (HUMINT)
D Signal Intelligence (SIGINT)
A - Open source intelligence (OSINT)
Which of the following statements is not true for IPv4?
A The IPv4 protocol is primary concerned with routing.
B The IPv4 protocol operates at OSI level 5 of the OSI reference model.
C The IPv4 makes use of 32bit integers to for source and destination addressing.
D The IPv4 protocol contains a header checksum
B - The IPv4 protocol operates at OSI level 5 of the OSI reference model.
Which of the following statements is not true for TCP?
A The TCP protocol is primary concerned reliability.
B The TCP protocol operates at OSI level 4/5 of the OSI reference model.
C The TCP protocol supports positive acknowledgement and retransmission
D The TCP protocol contains no error checking
D - The TCP protocol contains no error checking
With regard to the TCP connection initialisation phase, which of the following is the TCP three way handshake that results in the TCP protocol establishing a bi-directional reliable data connection?
A Syn/Rst - Syn - Ack.
B Syn - Syn/Ack – Ack
C Ack - Ack/Syn – Syn
D Syn - Ack/Ack – Syn
B - Syn - Syn/Ack – Ack
Using Domain Internet Groper command (Dig), we can achieve a zone transfer via use of the following option.
A zxtr
B xafr
C axfr
D zxta
C - axfr
Which of the following statements is true for UDP?
A UDP is stateless and therefore not used where reliability is a requirement
B UDP is stateful
C UDP supports retransmission
D UDP supports security
A - UDP is stateless and therefore not used where reliability is a requirement
Which of the following terms best describes a piece of malware, which travels between computer systems without human intervention?
A Virus
B Worm
C Trojan Horse
D Trapdoor
B - Worm
Which of the following statements is true for the Telnet Protocol?
A It does not implement any form of data encryption inside the TCP packet.
B It was designed to support secure remote access to a computer system
C It typically runs on TCP port 22
D It supports the use of digital certificates
A - It does not implement any form of data encryption inside the TCP packet.
Which of the following functions can the ICMP protocol not be used for?
A Routers sending error messages to other routers and hosts.
B Identification of the network address of a given host.
C Controlling the rate of flow of information between network interface cards.
D Identification of a hostname from an IP address.
C - Controlling the rate of flow of information between network interface cards.
Best Practice for security reviews consist of 4 stages, which of the following is not one of these stages?
A Network enumeration to identify IP networks and hosts of interest
B Frequency analysis of network packet protocols
C Bulk network scanning and probing to identify potentially vulnerable hosts
D Exploitation of vulnerabilities and circumvention of security mechanisms
B - Frequency analysis of network packet protocols
Which of the following statements best describes the principles underlying RIP protocol?
A It is an implementation of black hole routing for local networks
B It is an implementation of the shortest path routing for local networks
C It is an implementation of n-dimension vector matrix routing for local networks
D It is an implementation of distance vector routing for local networks
D - It is an implementation of distance vector routing for local networks
Which of the following statements best describes the principles underlying security in the RIP Version 1 protocol?
A It was not designed with security
B It implements security via digital signatures
C It implements security via a shared symmetric key
D It implements security via digital signatures and IPSEC
A - It was not designed with security
The OSPF supports which of the following authentication methods?
A It implements authentication via a shared asymmetric key
B It implements authentication via digital signatures
C It implements authentication via a simple password which is sent in the clear
D It implements authentication via a hash of the password
C - It implements authentication via a simple password which is sent in the clear
OSPF send its authentication via which of the following message types?
A HELLO
B AUTHENT
C TOPOLOGY
D INTRO
A - HELLO
Using RIPv1 how do routers communicate with each other?
A Via unicast
B Via broadcast
C Via multicast
D Via point to point secure messaging
B - Via broadcast
CVE Stands for?
A Common Vulnerabilities and Exposures
B Computer Vulnerability Exposure
C Common Vulnerability Element
D Computer Vulnerability Element
A - Common Vulnerabilities and Exposures
Which of the following is true for the following CIDR address: 10.0.0.0/25?
A There are 254 hosts in the address range
B There are 126 hosts in the address range
C There are 62 hosts in the address range
D There are 510 hosts in the address range
B - There are 126 hosts in the address range
To use netstat to display routing tables, which of the following switches is required?
A -a
B -n
C -p
D -r
D - -r
Which of the following is not a recognised security Standard?
A ISO9001
B Orange Book
C ITSEC
D Common Criteria
A - ISO9001
The following command is used on a Windows NT machine: ipconfig /renew What does this do?
A Releases all IP addresses
B Renews the first active IP address
C Renews all IP addresses
D None of the above
B - Renews the first active IP address
In an IP packet, the field “type of service” defines precedence, which of these is the highest priority?
A Flash
B Immediate
C Inter-network control
D Priority
A - Flash
Which of the following TCP port numbers is normally associated with the netbios?
A 11
B 139
C 43
D 88
B - 139
Which layer of the OSI network model provides an interface to protocols such as HTTP and POP3?
A Application
B Transport
C Network
D Physical
A - Application
With regard to anonymous FTP servers on a UNIX system which of the following is not a common misconfiguration?
A Making the pub directory world writeable.
B Making the root ftp directory owned by root
C Using the real password file in etc directory
D Making the password file world writeable
B - Making the root ftp directory owned by root
What does the following nmap command do? nmap -P0 -sS -p 80 192.168.204.1
A Determines if port 80 is open using a SYN scan
B Determines if any port is open using a SYN Scan
C Determines if any port is open using a TCP Scan
D Determines if port 80 is open using a full TCP Connect Scan
A - Determines if port 80 is open using a SYN scan
On a Windows System what does the following netstat command achieve? netstat -p udp –a
A Displays all UDP activity on the same subnet as the host
B Displays all out-going UDP ports on the current machine
C Displays all listening and active UDP ports on the current machine
D Displays all Ethernet statistic for the current machine
C - Displays all listening and active UDP ports on the current machine
Which of the following tools allows Ethernet/IP pairings to be monitored?
A Arptoxin
B Arpwatch
C Arpsniff
D Arpd
B - Arpwatch
Which of the following TCP port numbers is normally associated with kerberos?
A 88
B 43
C 80
D 109
A - 88
What is the p0f tool used for?
A Packet Capture
B SYN Flooding
C Operating System fingerprinting
D ARP Poisoning
C - Operating System fingerprinting
Using the netstat command under UNIX which switch displays the program identifier / Program name?
A -v
B -p
C -l
D -n
B - -p
A system on a Class B subnet has the IP address 172.16.48.196 and the subnet mask 255.255.0.0 What would be the broadcast address?
A 172.255.255.255
B 172.16.255.255
C 172.16.48.255
D 255.255.255.196
B - 172.16.255.255
What does the following nmap scan achieve? nmap -P0 -sX -p 80 192.168.204.1
A Determines if a port is open using an XMAS Scan
B Determines if a port is open using a TCP handshake
C Determines if a port is open using an SYN Scan
D Determines if a port is open using a FIN Scan
A - Determines if a port is open using an XMAS Scan
Which of the following list of protocols encrypts data over a network?
A TELNET
B HTTP
C SNMP
D TLS
D - TLS
What does the following nmap command do? nmap -P0 -sU -p 80 192.168.204.1
A Determines if port 80 is open using a SYN scan
B Determines if any port is open using a FIN Scan
C Determines if a standard UDP port is open
D Determines if port 80 is open using a Universal Scan
C - Determines if a standard UDP port is open
Which of the following TCP port numbers is normally associated with DNS?
A 53
B 109
C 80
D 23
A - 53
Which of the following is not an Information function supported by ICMP?
A Flow control
B Detecting unreachable destinations
C Route Redirection
D System reliability checking
B - Detecting unreachable destinations
The traceroute command is typically used to?
A Determine if a specific port is open or closed
B Identify if a computer is connected to a network
C Identify the route to a host on a network
D Identify all possible routes to a host on a network
C - Identify the route to a host on a network
What does the following ping command sent from a Windows system achieve? ping -r 5 www.example.co.uk -n 2
A Pings the specified address with 2 echo requests while recording 5 count hops
B Pings the specified address with 5 echo requests while recording count hops
C Pings the specified address with 5 echo requests while timing count hops
D Pings the specified address while specifying a timeout
A - Pings the specified address with 2 echo requests while recording 5 count hops
Which of the following is not a non-routable IP address?
A 10.16.48.56
B 172.16.48.10
C 192.168.254.212
D 212.58.254.252
D - 212.58.254.252
The arptoxin tool is usually associated with which Operating System?
A Mac
B Unix
C Linux
D Windows
D - Windows
A bitwise, prefix-based standard for the interpretation of IP addresses is known as?
A A.B.C.D/N
B N/A.B.C.D
C IPv4
D CIDR
D - CIDR
Which of the following is the sending of a packet to multiple destinations using the most efficient system to produce a simultaneous delivery?
A Broadcast
B Multicast
C Unicast
D Fastcast
B - Multicast
With regard to security issues associated with TFTP, which of the following assertions is true
A TFTP makes uses of biometrics for authentication
B TFTP makes use of digital signature for authentication
C TFTP does not require authentication
D TFTP uses simple passwords authentication
C - TFTP does not require authentication
With reference to the Data Protection Act 1998 which of the following best describes a ‘Data Processor’:
A Any system which is used to process data
B Any person other than an employee of the data controller who processes the data on behalf of the data controller.
C Any mechanical, manual or electronic system used to process data
D Any person who processes the data on behalf of the data controller.
D - Any person who processes the data on behalf of the data controller.
Which of the following sections of the Computer Misuse Act 1990 deals with facilitating further offences?
A Section 1
B Section 2
C Section 3
D Section 3A
B - Section 2