Questions 76-100 Flashcards
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a
maximum length of (264 - 1) bits, and resembles the MD5 algorithm?
A. SHA-3
B. SHA-1
C. SHA-0
D. SHA-2
B. SHA-1
Which one of the following Google advance search operators allows an attacker to restrict the results to those websites in the given domain? A. [cache:] B. [site:] C. [inurl:] D. [link:]
B. [site:]
Security Policy is a definition of what it means to be secure for a system, organization or other entity. For
Information Technologies, there are sub-policies like; Computer Security Policy, Information Protection Policy,
Information Security Policy, Network Security Policy, Physical Security Policy, Remote Access Policy, User
Account Policy.
What is main theme of the sub-policies for Information Technologies?
A. Confidentiality, Integrity, Availability
B. Availability, Non-repudiation, Confidentiality
C. Authenticity, Integrity, Non-repudiation
D. Authenticity, Confidentiality, Integrity
A. Confidentiality, Integrity, Availability
Which one of the following approaches are commonly used to automatically detect host intrusions? A. Network traffic analysis B. The host's network interface use C. File checksums D. System CPU utilization
C. File checksums
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access? A. Sandbox Exploit B. Userland Exploit C. Bootrom Exploit D. iBoot Exploit
B. Userland Exploit
You perform a scan of your company's network and discover that TCP port 123 is open. What services by default run on TCP port 123? A. POP3 B. Telnet C. Network Time Protocol D. DNS
C. Network Time Protocol
Which of the following act requires employers standard national numbers to identify them on standard transactions? A. HIPAA B. PCI-DSS C. DMCA D. SOX
A. HIPAA
Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets
(e.g. the password to an encrypted file) from a person by coercion or torture?
A. Rubber Hose Attack
B. Timing Attack
C. Chosen-Cipher text Attack
D. Ciphertext-only Attack
A. Rubber Hose Attack
A hacker is an intelligent individual with excellent computer skills that grant them the ability to explore a
computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain
knowledge or to illegally make changes.
Which of the following class of hacker refers to individual who work both offensively and defensively at various
times?
A. Black Hat
B. Suicide Hacker
C. White Hat
D. Gray Hat
D. Gray Hat
When tuning security alerts, what is the best approach?
A. Decrease False negatives
B. Decrease the false positives
C. Rise False positives Rise False Negatives
D. Tune to avoid False positives and False Negatives
D. Tune to avoid False positives and False Negatives
You are looking for SQL injection vulnerability by sending special character to web applications. Which of the
following is most useful to quick validation?
A. Semicolon
B. Backslash
C. Single quotation
D. Double quotation
C. Single quotation
The collection of potentially actionable, overt, and publicly available information is known as A. Open-source intelligence B. Social intelligence C. Real intelligence D. Human intelligence
A. Open-source intelligence
If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use? A. -F B. -r C. -P D. -sP
A. -F
Risks = Threats x Vulnerabilities is referred to as the: A. Risk equation B. Threat assessment C. BIA equation D. Disaster recovery formula
A. Risk equation
Which of the following statements regarding ethical hacking is incorrect?
A. Testing should be remotely performed offsite.
B. Ethical hacking should not involve writing to or modifying the target systems.
C. Ethical hackers should never use tools or methods that have the potential or exploiting vulnerabilities in an organization’s systems.
D. An organization should use ethical hackers who do not sell vendor hardware/software or other consulting
services.
C. Ethical hackers should never use tools or methods that have the potential or exploiting vulnerabilities in an organization’s systems.