Question 1: Correct
In many states sending spam is illegal.
Thus, the spammers have techniques to try and ensure that no one knows they
sent the spam out to thousands of users at a time. Which of the following best
describes what spammers use to hide the origin of these types of e-mails?
A. A blacklist of companies that have
their mail server relays configured to allow traffic only to their specific
domain name.
B. Mail relaying, which is a technique
of bouncing e-mail from internal to external mails servers continuously.(Correct)
C. A blacklist of companies that have
their mail server relays configured to be wide open.
D. Tools that will reconfigure a mail
server’s relay component to send the e-mail back to the spammers occasionally.
Question 2: Correct
Todd has been asked by the security
officer to purchase a counter-based authentication system. Which of the
following best describes this type of system?
A. A biometric system that bases
authentication decisions on behavioral attributes.
B. A biometric system that bases authentication
decisions on physical attributes.
C. An authentication system that creates
one-time passwords that are encrypted with secret keys. (Correct)
D. An authentication system that uses
passphrases that are converted into virtual passwords.
Question 3: Correct
How can rainbow tables be defeated?
A. Password salting (Correct)
B. Use of non-dictionary words
C. All uppercase character passwords
D. Lockout accounts under brute force
password cracking attempts
Question 4: Correct
A hacker has successfully infected an
internet-facing server which he will then use to send junk mail, take part in
coordinated attacks, or host junk email content.
Which sort of trojan infects this server?
Which sort of trojan infects this server?
A. Botnet Trojan (Correct)
B. Turtle Trojans
C. Banking Trojans
D. Ransomware Trojans
Question 5: Correct
In order to have an anonymous Internet
surf, which of the following is best choice?
A. Use SSL sites when entering personal
information
B. Use Tor network with multi-node (Correct)
C. Use shared WiFi
D. Use public VPN
Question 6: Correct
In which phase of the ethical hacking
process can Google hacking be employed? This is a technique that involves
manipulating a search string with specific operators to search for
vulnerabilities.
Example: allintitle: root passwd
Example: allintitle: root passwd
A. Maintaining Access
B. Gaining Access
C. Reconnaissance (Correct)
D. Scanning and Enumeration
Question 7: Correct
In both pharming and phishing attacks an
attacker can create websites that look similar to legitimate sites with the
intent of collecting personal identifiable information from its victims. What
is the difference between pharming and phishing attacks?
A. Both pharming and phishing attacks
are identical.
B. In a pharming attack a victim is
redirected to a fake website by modifying their host configuration file or by
exploiting vulnerabilities in DNS. In a phishingattack an attacker provides the
victim with a URL that is either misspelled or looks similar to the actual
websites domain name. (Correct)
C. In a phishing attack a victim is
redirected to a fake website by modifying their host configuration file or by
exploiting vulnerabilities in DNS. In a phishingattack an attacker provides the
victim with a URL that is either misspelled or looks similar to the actual
websites domain name.
D. Both pharming and phishing attacks
are purely technical and are not considered forms of social engineering
Question 8: Correct
What is the role of test automation in
security testing?
A. It is an option but it tends to be
very expensive.
B. It should be used exclusively. Manual
testing is outdated because of low spend and possible test setup
inconsistencies.
C. Test automation is not usable in
security due to the complexity of the tests.
D. It can accelerate benchmark tests and
repeat them with a consistent test setup. But it cannot replace manual testing
completely. (Correct)
Question 9: Correct
Jimmy is standing outside a secure
entrance to a facility. He is pretending to have a tense conversation on his
cell phone as an authorized employee badges in.
Jimmy, while still on the phone, grabs the door as it begins to close.
What just happened?
Jimmy, while still on the phone, grabs the door as it begins to close.
What just happened?
A. Masquerading
B. Tailgating (Correct)
C. Phishing
D. Whaling
Question 10: Correct
What is the most secure way to mitigate
the theft of corporate information from a laptop that was left in a hotel room?
A. Set a BIOS password
B. Encrypt the data on the hard drive. (Correct)
C. Use a strong logon password to the
operating system.
D. Back up everything on the laptop and
store the backup in a safe place.
Question 11: Correct
A regional bank hires your company to
perform a security assessment on their network after a recent data breach. The
attacker was able to steal financial data from the bank by compromising only a
single server. Based on this information, what should be one of your key recommendations
to the bank?
A. Place a front-end web server in a
demilitarized zone that only handles external web traffic (Correct)
B. Require all employees to change their
passwords immediately
C. Move the financial data to another
server on the same IP subnet
D. Issue new certificates to the web
servers from the root certificate authority
Question 12: Correct
Which of the following is considered an
exploit framework and has the ability to perform automated attacks on services,
ports, applications an unpatched security flaws in a computer system?
A. Nessus
B. Metasploit (Correct)
C. Maltego
D. Wireshark
Question 13: Correct
You want to analyze packets on your
wireless network. Which program would you use?
A. Wireshark with Airpcap (Correct)
B. Airsnort with Airpcap
C. Wireshark with Winpcap
D. Ethereal with Winpcap
Question 14: Correct
Which of the following areas is considered
a strength of symmetric key cryptography when compared with asymmetric
algorithms?
A. Scalability
B. Speed (Correct)
C. Key distribution
D. Security
Question 15: Correct
Which type of security feature stops
vehicles from crashing through the doors of a building?
A. Turnstile
B. Bollards (Correct)
C. Mantrap
D. Receptionist
Question 16: Correct
The following is part of a log file taken
from the machine on the network with the IP address of 192.168.1.106:
What type of activity has been logged?
A. Port scan targeting 192.168.1.103
B. Teardrop attack targeting
192.168.1.106
C. Denial of service attack targeting
192.168.1.103
D. Port scan targeting 192.168.1.106 (Correct)
Question 17: Correct
A security analyst is performing an audit
on the network to determine if there are any deviations from the security
policies in place. The analyst discovers that a user from the IT department had
a dial-out modem installed. Which security policy must the security analyst
check to see if dial-out modems are allowed?
A. Firewall-management policy
B. Acceptable-use policy
C. Remote-access policy (Correct)
D. Permissive policy
Question 18: Correct
You have successfully compromised a
machine on the network and found a server that is alive on the same network.
You tried to ping it but you didn’t get any response back.
What is happening?
What is happening?
A. ICMP could be disabled on the target
server. (Correct)
B. The ARP is disabled on the target
server.
C. TCP/IP doesn’t support ICMP.
D. You need to run the ping command with
root privileges.
Question 19: Correct
A large mobile telephony and data network
operator has a data that houses network elements. These are essentially large
computers running on Linux. The perimeter of the data center is secured with
firewalls and IPS systems.
What is the best security policy concerning this setup?
What is the best security policy concerning this setup?
A. Network elements must be hardened
with user ids and strong passwords. Regular security tests and audits should be
performed. (Correct)
B. As long as the physical access to the
network elements is restricted, there is no need for additional measures.
C. There is no need for specific
security measures on the network elements as long as firewalls and IPS systems
exist.
D. The operator knows that attacks and
down time are inevitable and should have a backup site.
Question 20: Correct
Which of the following incident handling
process phases is responsible for defining rules, collaborating human
workforce, creating a back-up plan, and testing the plans for an organization?
A. Preparation phase (Correct)
B. Containment phase
C. Identification phase
D. Recovery phase

0 Komentar