Questions 151-175 Flashcards
Which of the following is a serious vulnerability in the popular OpenSSL cryptographic software library? This
week this allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used
to secure the Internet.
A. SSL/TLS Renegotiation vulnerability
B. POODLE
C. Shellshock
D. Heartbleed bug
D. Heartbleed bug
There are several ways to gain insight on how a cryptosystem works with the goal of reverse engineering the
process. A term describes when two pieces of data result in the same value is?
A. Escrow
B. Collusion
C. Collision
D. Polymorphism
C. Collision
The company ABC recently contracts a new accountant. The accountants will be working with the financial
statements. Those financial statements need to be approved by the CFO and then they will be sent to the
accountant but the CFO is worried because he wants to be sure that the information sent to the accountant
was not modified once he approved it. Which of the following options can be useful to ensure the integrity of
the data?
A. The document can be sent to the accountant using an exclusive USB for that document.
B. The financial statements can be sent twice, one by e-mail and the other delivered in USB and the
accountant can compare both to be sure it is the same document.
C. The CFO can use a hash algorithm in the document once he approved the financial statements
D. The CFO can use in excel file with a password
C. The CFO can use a hash algorithm in the document once he approved the financial statements
What is correct about digital signatures?
A. A digital signature cannot be moved from one signed document to another because it is a plain hash of the document content.
B. Digital signatures may be used in different documents of the same type.
C. A digital signature cannot be moved from one sign document to another because it is the hash of the
original document encrypted with the private key of the signing party.
D. Digital signatures are issued once for each user and can be used everywhere until they expire.
C. A digital signature cannot be moved from one sign document to another because it is the hash of the original document encrypted with the private key of the signing party.
Which service in a PKI will vouch for the identity of an individual or company ? A. KDC B. CR C. CBC D. CA
D. CA
Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small size packets
to the target computer, making it very difficult for an IDS to detect the attack signatures.
Which tool can be used to perform session splicing attacks?
A. tcpsplice
B. Hydra
C. Burp
D. Whisker
D. Whisker
The security concept of "separation of duties" is most similar to the operation of which type of security device? A. Intrusion Detection System B. Honeypot C. Firewall D. Bastion host
D. Bastion host
You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing
traffic from this server will not be caught by a Network Based Intrusion Detection Systems (NIDS).
What is the best way to evade the NIDS?
A. Protocol Isolation
B. Out of band signalling
C. Alternate Data Streams
D. Encryption
D. Encryption
Which of the following types of firewalls ensures that the packets are part of the established session? A. Circuit-level firewall B. Stateful inspection firewall C. Application-level firewall D. Switch-level firewall
B. Stateful inspection firewall
Which of the following is an extremely common IDS evasion technique in the web world? A. Subnetting B. Spyware C. Port knocking D. Unicode Characters
D. Unicode Characters
During a blackbox pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled
host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded.
What type of firewall is inspecting outbound traffic?
A. Circuit
B. Packet Filtering
C. Stateful
D. Application
C. Stateful
You just set up a security system in your network. In what kind of system would you find the following string of
characters used as a rule within its configuration?
alert tcp any any -> 192.168.100.0/24 21 (msg: “FTP on the network!”;)
A. An Intrusion Detection System
B. A Router IP Table
C. A firewall IP Table
D. FTP Server rule
A. An Intrusion Detection System
Which of the following is designed to identify malicious attempts to penetrate systems? A. Intrusion Detection System B. Firewall C. Proxy D. Router
A. Intrusion Detection System
You work as a Security Analyst for a retail organization. In securing the company’s network, you set up a
firewall and an IDS. However, hackers are able to attack the network. After investigating, you discover that your
IDS is not configuring properly and therefore is unable to trigger alarms when needed. What type of alert is the
IDS giving?
A. False Positive
B. True Negative
C. True Positive
D. False Negative
D. False Negative
You have compromised a server and successfully gained a root access. You want to pivot and pass traffic
undetected over the network and evade any possible IDS.
What is the best approach?
A. Use HTTP so that all traffic can be routed via a browser, thus evading the internal IDS.
B. Use Alternate Data Streams to hide the outgoing packets from this server.
C. Install and use Telnet to encrypt all outgoing traffic from this server.
D. Install Cryptcat and encrypt outgoing packets from this server.
D. Install Cryptcat and encrypt outgoing packets from this server.