Questions 51-75 Flashcards
What type of a vulnerability/attack is it when the malicious person forces the user's browser to send an authenticated request to a server? A. Cross-site request forgery B. Session hijacking C. Cross-site scripting D. Server side request forgery
A. Cross-site request forgery
Which of the following is incorrect? Standard Range (ft) 802.11a 150-150 802.11b 150-150 802.11g 150-150 802.16 (WiMax) 30 miles A. 802.11b B. 802.11g C. 802.11a D. 802.16 (WiMax)
C. 802.11a
If you are the Network Admin and you get a Compliant that some of the Websites are no longer accessible.
You try to ping the servers, it’s reachable. Then you type the IP address and then try on the browser, even then
its accessible. But they are not accessible when you try using the URL.
What may be the Problem ?
A. Traffic is Blocked on TCP port 80.
B. Traffic is Blocked on UDP Port 53.
C. Traffic is blocked on TCP Port 54.
D. Traffic is Blocked on UDP port 80
B. Traffic is blocked on UDP Port 53
What is the least important information when you analyse a public IP address in a security alert? A. Whois B. ARP C. DNS D. Geolocation
B. ARP
In Wireshark, the packet bytes panes shows the data of the current packet in which format? A. Binary B. ASCII only C. Decimal D. Hexadecimal
D. Hexadecimal
Which of the following antenna commonly used in communications for a frequency band of 10 MHz to VHF and UHF? A. Parabolic grid antenna B. Omnidirectional antenna C. Dipole antenna D. Yagi antenna
D. Yagi antenna
Which one of the following options represents a conceptual characteristic of an anomaly-based IDS over a
signature-based IDS?
A. Can identify unknown attacks
B. Cannot deal with encrypted network traffic
C. Produces less false positives
D. Requires vendor updates for new threats
A. Can identify unknown attacks
When does the Payment Card Industry Data Security Standard (PCI-DSS) require organizations to perform
external and internal penetration testing?
A. At least once every three years and after any significant infrastructure or application upgrade or
modification
B. At least once a year and after any significant infrastructure or application upgrade or modification
C. At least once every two years and after any significant infrastructure or application upgrade or modification
D. At least twice a year and after any significant infrastructure or application upgrade or modification
B. At least once a year and after any significant infrastructure or application upgrade or modification
Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he configure
properly the firewall to allow access just to servers/ports which can have direct internet access, and block the
access to workstations.
Bob also concluded that DMZ really makes sense just when a stateful firewall is available, which is not the
case of TPNQM SA.
In this context, what you can say?
A. Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations.
B. Bob is partially right. Actually, DMZ doesn’t make sense when a stateless firewall is available.
C. Bob is partially right. He doesn’t need to separate networks if he can create rules by destination IPs, one by
one.
D. Bob can be right, DMZ doesn’t make sense combined with stateless firewalls.
A. Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations.
You are Monitoring the Network of your Organization. You notice that
1. There is huge Outbound Connections from your Internal Network to External IP’s.
2. On further Investigation you see that the external IP’s are Blacklisted.
3. Some connections are Accepted and some Dropped .
4. You find that it’s a CnC communication.
Which of the Following solution will you Suggest ?
A. Clean the Malware which are trying to Communicate with the External Blacklist IP’s.
B. Update the Latest Signatures on your IDS/IPS.
C. Block the Blacklist IP’s @ Firewall.
D. Both B and C
D. Both B and C
You need a tool that can do network intrusion prevention, but also intrusion detection and can function as a
network sniffer and records network activity, what tool would you most likely select?
A. Cain & Abel
B. Nmap
C. Snort
D. Nessus
C. Snort
When you are performing a risk assessment you need to determine the potential impacts if some of the critical
business processes of the company interrupt its service. What is the name of the process you need to
determine those critical business?
A. Disaster Recovery Planning (DRP)
B. Emergency Plan Response (EPR)
C. Risk Mitigation
D. Business Impact Analysis (BIA)
D. Business Impact Analysis (BIA)
Which of the following attacks exploits web page vulnerabilities that allow an attacker to force an unsuspecting
user’s browser to send malicious requests they did not intend?
A. Cross-Site Request Forgery (CSRF)
B. File Injection Attack
C. Command Injection Attacks
D. Hidden Field Manipulation Attack
A. Cross-Site Request Forgery (CSRF)
Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and
out the target network based on pre-defined set of rules.
Which of the following types of firewalls can protect against SQL injection attacks?
A. Data-driven firewall
B. Web application firewall
C. Stateful firewall
D. Packet firewall
B. Web application firewall
Alice encrypts her data using her public key PK and stores the encrypted data in the cloud. Which of the
following attack scenarios will compromise the privacy of her data?
A. Hacker Harry breaks into the cloud server and steals the encrypted data.
B. Alice also stores her private key in the cloud, and Harry breaks into the cloud server as before
C. Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the cloud server
successfully resists Andrew’s attempt to access the stored data
D. None of these scenarios compromise the privacy of Alice’s data
B. Alice also stores her private key in the cloud, and Harry breaks into the cloud server as before