Questions 126-150 Flashcards

1
Q

When purchasing a biometric system, one of the considerations that should be reviewed is the processing
speed. Which of the following that best describes what is meant by processing?
A. The amount of time it takes to be either accepted or rejected from when an individual provides identification
and authentication information.
B. The amount of time it takes to convert biometric data into a template on a smart card.
C. The amount of time and resources that are necessary to maintain a biometric system.
D. How long it takes to set up individual user accounts

A

A. The amount of time it takes to be either accepted or rejected from when an individual provides identification
and authentication information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and intrusion
detection systems (IDS) on the network of an organization that has experienced a possible breach of security.
When the investigator attempts to correlate the information in all of the logs, the sequence of many of the log
events do not match up.
What is the most likely cause?
A. The network devices are not all synchronized.
B. Proper chain of custody was not observed while collecting the logs.
C. The attacker altered or erased events from the logs.
D. The security breach was a false positive.

A

A. The network devices are not all synchronized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If executives are found liable for not properly protecting their company’s assets in information systems, what
type of law would apply in this situation?
A. Common
B. International
C. Civil
D. Criminal

A

C. Civil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What two conditions must a digital signature meet?
A. Has to be unforgeable, and has to be authentic
B. Must be unique and have special characters
C. Has to be the same number of characters as a physical signature and must be unique.
D. Has to be legible and neat

A

A. Has to be unforgeable, and has to be authentic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the
host 10.0.0.3. Also he needs to permit all FTP traffic to the rest of the network and deny all other traffic. After
he applied his ACL configuration in the router no body can access the ftp and the permitted hosts cannot
access the INternet. According to the next configuration what is happening in the network?
access-list 102 deny tcp any any
access-list 104 permit udp host 10.0.0.3 any
access-list 110 permit tcp host 10.0.0.2 eq www any
access-list 108 permit tcp any eq ftp any
A. The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router.
B. The ACL 104 needs to be first because is UDP
C. The ACL for FTP must be before the ACL 110
D. The ACL 110 needs to be changed to port 80

A

A. The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A penetration test was done at a company. After the test, a report was written and given to the company’s IT
authorities. A section from the report is shown below:
Access list should be written between VLANs
Port security should be enabled for the intranet.
A security solution which filters data packets should be set between intranet (LAN) and DMZ.
A WAF should be used in front of the web applications.
According to the section from the report, which of the following is true?
A. Possibility of SQL injection attack is eliminated.
B. A stateful firewall can be used between intranet (LAN) and DMZ.
C. But there is access control policy between the VLANs.
D. MAC spoof attacks cannot be performed.

A

B. A stateful firewall can be used between intranet (LAN) and DMZ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You’re an ethical hacker who is auditing the ABC Company. When you verify the NOC one of the machines
has two connections, one wired and the other wireless. When you verify the configuration of his windows
system you find too static routes.
route add 10.0.0.0 mask 255.0.0.0 10.0.0.1
route add 0.0.0.0 mask 255.0.0.0 199.168.0.1
What is the main purpose of those static routes?
A. Both static routes indicate that the traffic is external with different gateway
B. Both static routes indicate that the traffic is internal with different gateway
C. The first static route indicates that the internal addresses are using the internal gateway and the second static route indicates that all the traffic that is not internal must go to an external gateway
D. The first static route indicates that the internal traffic will use an external gateway and the second static
routes indicates that the traffic will be rerouted

A

C. The first static route indicates that the internal addresses are using the internal gateway and the second static route indicates that all the traffic that is not internal must go to an external gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
#!/usr/bin/python
import socket
buffer=[""A""]
counter=50
while len(buffer) <=100
buffer append(""A""*counter)
counter=counter+50
commands=
{""HELP"",""STATS"",""RTIME"",""LTIME"",""SRUN"",""TRUN"",""GMON"",""GDOG"",""KSTET"",""GTER"",""HT
ER"",""LTER"",""KSTAN.""]
for command in commands:
for buffstring in bufer:
print ""Exploiting"" +command +"":""+str(len(buffstring))
s=socket.socket(socketAF_INET, socket SOCK_STREAM)
s.connect(('127.0.0.1',9999))
s.recv(50)
s.send(command+buffstring)
s.close
What is the code written for?
A. Buffer Overflow
B. Encryption
C. Cross site scripting
D. SQL injection
A

A. Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is not a PCI compliance recommendation?
A. Rotate employees handling credit card transactions on a yearly basis to different departments.
B. Use encryption to protect all transmission of card holder data over any public network.
C. Limit access to card holder data to as few individuals as possible.
D. Use a firewall between the public network and the payment card data

A

A. Rotate employees handling credit card transactions on a yearly basis to different departments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A large mobile telephony and data network operator has a data center that houses network elements. These
are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and
IPS systems. What is the best security policy concerning this setup?
A. Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.
B. The operator knows that attacks and down time are inevitable and should have a backup site
C. As long as the physical access to the network elements is restricted, there is no need for additional
measures
D. There is no need for specific security measures on the network elements as long as firewalls and IPS
systems exist.

A

A. Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following programming languages is most susceptible to buffer overflow attacks, due to its lack of
a built-in bounds checking mechanism?
Code:
#include 
int main(){
char buffer[8];
strcpy(buffer,""11111111111111111111111111111"");
}
Output:
Segmentation fault
A. C++
B. C#
C. Java
D. Python
A

A. C++

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Due to a slow down of normal network operations, IT department decided to monitor internet traffic for all of
the employees. From a legal stand point, what would be troublesome to take this kind of measure?
A. The network could still experience traffic slow down.
B. IT department would be telling employees who the boss is
C. All of the employees would stop normal work activities
D. Not informing the employees that they are going to be monitored could be an invasion of privacy.

A

D. Not informing the employees that they are going to be monitored could be an invasion of privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Risk Management, how is the term “likelihood” related to the concept of “threat?”
A. Likelihood is a possible threat-source that may exploit a vulnerability.
B. Likelihood is the probability that a threat-source will exploit a vulnerability.
C. Likelihood is the likely source of a threat that could exploit a vulnerability.
D. Likelihood is the probability that a vulnerability is a threat-source.

A

B. Likelihood is the probability that a threat-source will exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
This asymmetry cipher is based on factoring the product of two large prime numbers.
A. MD5
B. SHA
C. RC5
D. RSA
A

D. RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the structure designed to verify and authenticate the identity of individuals within the
enterprise taking part in a data exchange?
A. PKI
B. biometrics
C. SOA
D. single sign on

A

A. PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A common cryptographical tool is the use of XOR. XOR the following binary values:

10110001
00111010

A. 10011101
B. 10001011
C. 10111100
D. 11011000

A

B. 10001011

17
Q

The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities
and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the transport layer
security (TLS) protocols defined in RFC6520.
What type of key does this bug leave exposed to the Internet making exploitation of any compromised system
very easy?
A. Root
B. Shared
C. Public
D. Private

A

D. Private

18
Q

What is a “Collision attack” in cryptography
A. Collision attacks try to get the public key.
B. Collision attacks try to find two inputs producing the same hash.
C. Collision attacks try to break the hash into three parts to get the plaintext value.
D. Collision attacks try to break the hash into parts, with the same bytes in each part to get the private key.

A

B. Collision attacks try to find two inputs producing the same hash.

19
Q
PGP, SSL, and IKE are all examples of which type of cryptography?
A. Digest
B. Public Key
C. Secret Key
D. Hash Algorithm
A

B. Public Key

20
Q
Which of the following is assured by the use of a hash?
A. Confidentiality
B. Availability
C. Authentication
D. Integrity
A

D. Integrity

21
Q
Which of the following is the successor of SSL?
A. GRE
B. TLS
C. RSA
D. IPSec
A

B. TLS

22
Q
Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the
best protection that will work for her?
A. BIOS password
B. Hidden folders
C. Full disk encryption
D. Password protected files
A

C. Full disk encryption

23
Q

Cryptography is the practice and study of techniques for secure communication and the presence of third
parties (called adversaries). More generally, is about constructing and analyzing protocols that overcome the
influence of adversaries and that are related to various aspects in information security such as data
confidentiality, data integrity, authentication, and non-repudiation. Modern cryptography intersects the
disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include
ATM cards, computer passwords, and electronic commerce.
Which of the following choices is true about cryptography?
A. Algorithm is not the secret, key is the secret.
B. Symmetric key algorithms are a class of algorithms for cryptography that use the different cryptographic
keys for both encryption of plain text and the decryption of ciphertext
C. Public key cryptography, also known as asymmetric cryptography, public key is for decrypt, private key is
for encrypt.
D. Secure sockets layer (SSL) use the asymmetric encryption (public/private) key pair to deliver the shared
session key and to achieve a communication way.

A

D. Secure sockets layer (SSL) use the asymmetric encryption (public/private) key pair to deliver the shared
session key and to achieve a communication way.

24
Q

What is the difference between the AES and RSA algorithms?
A. Both are symmetric algorithms, but AES uses 256-bit keys.
B. AES is asymmetric, which is used to create a public/private key pair; RSA is symmetric, which is used to
encrypt data
C. RSA is asymmetric, which is used to create a public/private key pair; AES is symmetric, which is used to
encrypt data
D. Both are asymmetric algorithms, but RSA uses 1024-bit keys

A

C. RSA is asymmetric, which is used to create a public/private key pair; AES is symmetric, which is used to encrypt data

25
Q
Which of the following areas is considered a strength of symmetric key cryptography when compared to
asymmetric algorithms?
A. Key distribution
B. Speed
C. Scalability
D. Security
A

B. Speed