Questions 26-50 Flashcards
An unauthorized individual enters a building following an employee through the employee entrance after the
lunch rush. What type of breach has the individual just performed?
A. Tailgating
B. Reverse Social Engineering
C. Piggybacking
D. Announced
A. Tailgating
You are a security officer of a company. You had an alert from IDS that indicate one PC on your Intranet
connected to a blacklisted IP address(C2 Server) on the Internet. The IP address was blacklisted just before of
the alert. You are starting investigation to know the severity of situation roughly. Which of the following is
appropriate to analyze?
A. Event logs on domain controller
B. Event logs on the PC
C. Internet Firewall/Proxy log
D. IDS log
C. Internet Firewall/Proxy Log
Code injection is a form of attack in which a malicious user:
A. Inserts additional code into the JavaScript running in the browser.
B. Gains access to the codebase on the server and inserts new code.
C. Inserts text into a data field that gets interpreted as code.
D. Gets the server to execute arbitrary code using a buffer overflow.
C. Insert text into a data field that gets interpreted as code.
In which of the following cryptography attack methods, attacker makes a series of interactive queries, choosing
subsequent plaintexts based on the information from the previous encryptions?
A. Chosen-plaintext attack
B. Ciphertext-only attack
C. Adaptive chosen-plaintext attack
D. Known-plaintext attack
C. Adaptive chosen-plaintext attack
When conducting a penetration test it is crucial to use all means to get all available information about the target
network. One of the ways to do that is by sniffing the network.Which of the following cannot be performed by
the passive network sniffing?
A. Collecting unencrypted information about usernames and passwords
B. Modifying and replaying captured network traffic
C. Capturing a network traffic for further analysis
D. Identifying operating systems, services, protocols and devices
B. Modifying and replaying captured network traffic
If an attacker uses the command SELECT * FROM user WHERE name = ‘x’ AND userid IS NULL; –’; which
type of SQL injection attack is the attacker performing?
A. UNION SQL Injection
B. Tautology
C. End of Line Comment
D. Illegal/Logically Incorrect Query
C. End of line comment
Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in
the wired network to have Internet access.In the university campus there are many Ethernet ports available for
professors and authorized visitors, but not for students.
He identified this when the IDS alerted for malware activities in the network.
What Bob should do to avoid this problem?
A. Use the 802.1x protocol.
B. Disable unused ports in the switches.
C. Separate students in a different VLAN.
D. Ask students to use the wireless network.
A. Use the 802.1x protocol
Steve, a scientist which works in a governmental security agency, developed a technological solution to
identify people based on walking patterns, and implemented this approach to a physical control access.
A camera captures people walking and identifies the individuals using Steve’s approach.
After that, people must approximate their RFID badges.Both identification are required to open the door.
In this case, we can say:
A. Although the approach has two phases, it actually implements just one authentication factor
B. The solution implements the two authentication factors: physical object and physical characteristic
C. Biological motion cannot be used to identify people
D. The solution will have a high level of false positives
B. The solution implements the two authentication factors: physical object and physical characteristic
Bob finished a C programming course and created a small C application to monitor the network traffic and to
produce alerts when any origin sends “many” IP packets, based on the average number of packets sent by all
origins and using some thresholds.
In concept, the solution developed by Bob is actually:
A. Just a network monitoring tool
B. A behavioral IDS
C. A signature IDS
D. A hybrid IDS
B. A behavioral IDS
Insecure direct object reference is a type of the vulnerability where application doesn’t verify if the user is
authorized to access internal object via its name or key.
Suppose the malicious user Rob tries to get an access to the account of the benign user Ned.
Which of the following requests best illustrates an attempt to exploit an insecure direct object reference
vulnerability?
A. GET /restricted/\r\n\%00account%00Ned%00access HTTP/1.1
Host: westbank.com
B. GET /restricted/accounts/?name=Ned HTTP/1.1
Host: westbank.com
C. GET /restricted/bank.getaccount(‘Ned’) HTTP/1.1
Host: westbank.com
D. GET /restricted/goldtransfer?to=Rob&from=1 or 1=1’ HTTP/1.1
Host: westbank.com
B. GET /restricted/accounts/?name=Ned HTTP/1.1
Host: westbank.com
Sam is working as a pen-tester in an organization in Houston. He performs penetration testing on IDS in order
to find the different ways an attacker uses to evade the IDS. Sam sends large amount of packets to the target
IDS that generate alerts which enable Sam to hide the real traffic. What type of method is Sam using to evade
IDS?
A. Obfuscating
B. False Positive Generation
C. Insertion Attack
D. Denial-of-Service
B. False Positive Generation
Which of the following is a serious vulnerability in the popular OpenSSL cryptographic software library. This
weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used
to secure the Internet.
A. SSL/TLS Renegotiation Vulnerability
B. POODLE
C. Shellshock
D. Heartbleed Bug
D. Heartbleed Bug
Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he
uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate
CPU and memory activities.
Which type of virus detection method did Chandler use in this context?
A. Code Emulation
B. Scanning
C. Heuristic Analysis
D. Integrity checking
A. Code Emulation
ping -* 6 192.168.0.101
output
Pinging 192.168.0.101 with 32 bytes of data:
Reply from 192.168.0.101: bytes=32 time<1ms TTL=128
Reply from 192.168.0.101: bytes=32 time<1ms TTL=128
Reply from 192.168.0.101: bytes=32 time<1ms TTL=128
Reply from 192.168.0.101: bytes=32 time<1ms TTL=128
Reply from 192.168.0.101: bytes=32 time<1ms TTL=128
Reply from 192.168.0.101: bytes=32 time<1ms TTL=128
Ping statistics for 192.168.0.101:
Packets: Sent = 6, Received = 6, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
What does the option * here ?
A. ‘a
B. ‘n
C. ‘s
D. ‘t
B. ‘n
What is the benefit of performing an unannounced Penetration Testing?
A. It is best approach to catch critical infrastructure unpatched.
B. The tester will get a clearer picture of measures applied to information and system security of the
organization.
C. The tester could easily acquire a complete overview of the infrastructure of the organization.
D. The tester can test the response capabilities of the target organization.
B. The tester will get a clearer picture of measures applied to information and system security of the
organization.