Questions 76-100 Flashcards

1
Q

Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a
maximum length of (264 - 1) bits, and resembles the MD5 algorithm?
A. SHA-3
B. SHA-1
C. SHA-0
D. SHA-2

A

B. SHA-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which one of the following Google advance search operators allows an attacker to restrict the results to those
websites in the given domain?
A. [cache:]
B. [site:]
C. [inurl:]
D. [link:]
A

B. [site:]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Policy is a definition of what it means to be secure for a system, organization or other entity. For
Information Technologies, there are sub-policies like; Computer Security Policy, Information Protection Policy,
Information Security Policy, Network Security Policy, Physical Security Policy, Remote Access Policy, User
Account Policy.
What is main theme of the sub-policies for Information Technologies?
A. Confidentiality, Integrity, Availability
B. Availability, Non-repudiation, Confidentiality
C. Authenticity, Integrity, Non-repudiation
D. Authenticity, Confidentiality, Integrity

A

A. Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which one of the following approaches are commonly used to automatically detect host intrusions?
A. Network traffic analysis
B. The host's network interface use
C. File checksums
D. System CPU utilization
A

C. File checksums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?
A. Sandbox Exploit
B. Userland Exploit
C. Bootrom Exploit
D. iBoot Exploit
A

B. Userland Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
You perform a scan of your company's network and discover that TCP port 123 is open. What services by
default run on TCP port 123?
A. POP3
B. Telnet
C. Network Time Protocol
D. DNS
A

C. Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following act requires employers standard national numbers to identify them on standard
transactions?
A. HIPAA
B. PCI-DSS
C. DMCA
D. SOX
A

A. HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets
(e.g. the password to an encrypted file) from a person by coercion or torture?
A. Rubber Hose Attack
B. Timing Attack
C. Chosen-Cipher text Attack
D. Ciphertext-only Attack

A

A. Rubber Hose Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A hacker is an intelligent individual with excellent computer skills that grant them the ability to explore a
computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain
knowledge or to illegally make changes.
Which of the following class of hacker refers to individual who work both offensively and defensively at various
times?
A. Black Hat
B. Suicide Hacker
C. White Hat
D. Gray Hat

A

D. Gray Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When tuning security alerts, what is the best approach?
A. Decrease False negatives
B. Decrease the false positives
C. Rise False positives Rise False Negatives
D. Tune to avoid False positives and False Negatives

A

D. Tune to avoid False positives and False Negatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are looking for SQL injection vulnerability by sending special character to web applications. Which of the
following is most useful to quick validation?
A. Semicolon
B. Backslash
C. Single quotation
D. Double quotation

A

C. Single quotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
The collection of potentially actionable, overt, and publicly available information is known as
A. Open-source intelligence
B. Social intelligence
C. Real intelligence
D. Human intelligence
A

A. Open-source intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use?
A. -F
B. -r
C. -P
D. -sP
A

A. -F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Risks = Threats x Vulnerabilities is referred to as the:
A. Risk equation
B. Threat assessment
C. BIA equation
D. Disaster recovery formula
A

A. Risk equation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following statements regarding ethical hacking is incorrect?
A. Testing should be remotely performed offsite.
B. Ethical hacking should not involve writing to or modifying the target systems.
C. Ethical hackers should never use tools or methods that have the potential or exploiting vulnerabilities in an organization’s systems.
D. An organization should use ethical hackers who do not sell vendor hardware/software or other consulting
services.

A

C. Ethical hackers should never use tools or methods that have the potential or exploiting vulnerabilities in an organization’s systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following is the least-likely physical characteristic to be used in biometric control that supports a
larger company?
A. Height and Weight
B. Voice
C. Iris patterns
D. Fingerprints
A

A. Height and Weight

17
Q

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment
through penetration testing.
What document describes the specifics of the testing, the associated violations, and essentially protects both
the organization’s interest and your liabilities as a tester?
A. Rules of Engagement
B. Project Scope
C. Service Level Agreement
D. Non-Disclosure Agreement

A

A. Rules of Engagement

18
Q

To determine if a software program properly handles a wide range of invalid input, a form of automated testing
can be used to randomly generate invalid input in an attempt to crash the program.
What term is commonly used when referring to this type of testing?
A. Fuzzing
B. Bounding
C. Mutating
D. Randomizing

A

A. Fuzzing

19
Q

Which of the following is the greatest threat posed by backups?
A. A backup is unavailable during disaster recovery.
B. An un-encrypted backup can be misplaced or stolen.
C. A backup is the source of Malware or illicit information.
D. A backup is incomplete because no verification was performed.

A

B. An un-encrypted backup can be misplaced or stolen.

20
Q

Which of the following is a design pattern based on distinct pieces of software providing application
functionality as service to other applications?
A. Object Oriented Architecture
B. Lean Coding
C. Service Oriented Architecture
D. Agile Process

A

C. Service Oriented Architecture

21
Q

When you return to your desk after a lunch break, you notice a strange email in your inbox. The sender is
someone you did business with recently, but the subject line has strange characters in it.
What should you do?
A. Forward the message to your company’s security response team and permanently delete the message
from your computer.
B. Reply to the sender and ask them for more information about the message contents.
C. Delete the email and pretend nothing happened.
D. Forward the message to your supervisor and ask for her opinion on how to handle the situation.

A

A. Forward the message to your company’s security response team and permanently delete the message
from your computer.

22
Q
Which of the following is a protocol specifically designed for transporting event messages?
A. SYSLOG
B. SMS
C. SNMP
D. ICMP
A

A. SYSLOG

23
Q

env x= ‘() { :;};echo exploit’ bash -c ‘cat /etc/passwd’
What is the Shellshock bash vulnerability attempting to do on an vulnerability Linux host?
A. Removes the passwd file
B. Add new user to the passwd file
C. Display passwd content to prompt
D. Changes all passwords in passwd

A

C. Display passwd content to prompt

24
Q

You have several plain-test firewall logs that you must review to evaluate network traffic. You know that in order
to do fast, efficient searches of the logs you must use regular expressions.
What command-line utility are you most likely to use?
A. Notepad
B. Relational Database
C. MS Excel
D. Grep

A

D. Grep

25
Q

You are performing a penetration test. You achieve access via a buffer overflow exploit and you proceed to find
interesting data, such as files with usernames and passwords. You find a hidden folder that has the
administrator’s bank account password and login information for the administrator’s bit coin account.
What should you do?
A. Do not report it and continue the penetration test.
B. Report immediately to the administrator.
C. Transfer money from the administrator’s account to another account.
D. Do not transfer the money but steal the bit coins.

A

B. Report immediately to the administrator.