Question 1: Correct
In many states sending spam is illegal. Thus, the spammers have techniques to try and ensure that no one knows they sent the spam out to thousands of users at a time. Which of the following best describes what spammers use to hide the origin of these types of e-mails?

A. A blacklist of companies that have their mail server relays configured to allow traffic only to their specific domain name.
B. Mail relaying, which is a technique of bouncing e-mail from internal to external mails servers continuously.(Correct)
C. A blacklist of companies that have their mail server relays configured to be wide open.
D. Tools that will reconfigure a mail server’s relay component to send the e-mail back to the spammers occasionally.

Question 2: Correct
Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?

A. A biometric system that bases authentication decisions on behavioral attributes.
B. A biometric system that bases authentication decisions on physical attributes.
C. An authentication system that creates one-time passwords that are encrypted with secret keys. (Correct)
D. An authentication system that uses passphrases that are converted into virtual passwords.

Question 3: Correct
How can rainbow tables be defeated?

A. Password salting (Correct)
B. Use of non-dictionary words
C. All uppercase character passwords
D. Lockout accounts under brute force password cracking attempts

Question 4: Correct
A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated attacks, or host junk email content.
Which sort of trojan infects this server?

A. Botnet Trojan (Correct)
B. Turtle Trojans
C. Banking Trojans
D. Ransomware Trojans

Question 5: Correct
In order to have an anonymous Internet surf, which of the following is best choice?

A. Use SSL sites when entering personal information
B. Use Tor network with multi-node (Correct)
C. Use shared WiFi
D. Use public VPN

Question 6: Correct
In which phase of the ethical hacking process can Google hacking be employed? This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities.
Example: allintitle: root passwd

A. Maintaining Access
B. Gaining Access
C. Reconnaissance (Correct)
D. Scanning and Enumeration

Question 7: Correct
In both pharming and phishing attacks an attacker can create websites that look similar to legitimate sites with the intent of collecting personal identifiable information from its victims. What is the difference between pharming and phishing attacks?

A. Both pharming and phishing attacks are identical.
B. In a pharming attack a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a phishingattack an attacker provides the victim with a URL that is either misspelled or looks similar to the actual websites domain name. (Correct)
C. In a phishing attack a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a phishingattack an attacker provides the victim with a URL that is either misspelled or looks similar to the actual websites domain name.
D. Both pharming and phishing attacks are purely technical and are not considered forms of social engineering

Question 8: Correct
What is the role of test automation in security testing?

A. It is an option but it tends to be very expensive.
B. It should be used exclusively. Manual testing is outdated because of low spend and possible test setup inconsistencies.
C. Test automation is not usable in security due to the complexity of the tests.
D. It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely. (Correct)

Question 9: Correct
Jimmy is standing outside a secure entrance to a facility. He is pretending to have a tense conversation on his cell phone as an authorized employee badges in.
Jimmy, while still on the phone, grabs the door as it begins to close.
What just happened?

A. Masquerading
B. Tailgating (Correct)
C. Phishing
D. Whaling

Question 10: Correct
What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?

A. Set a BIOS password
B. Encrypt the data on the hard drive. (Correct)
C. Use a strong logon password to the operating system.
D. Back up everything on the laptop and store the backup in a safe place.

Question 11: Correct
A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server. Based on this information, what should be one of your key recommendations to the bank?

A. Place a front-end web server in a demilitarized zone that only handles external web traffic (Correct)
B. Require all employees to change their passwords immediately
C. Move the financial data to another server on the same IP subnet
D. Issue new certificates to the web servers from the root certificate authority

Question 12: Correct
Which of the following is considered an exploit framework and has the ability to perform automated attacks on services, ports, applications an unpatched security flaws in a computer system?

A. Nessus
B. Metasploit (Correct)
C. Maltego
D. Wireshark

Question 13: Correct
You want to analyze packets on your wireless network. Which program would you use?

A. Wireshark with Airpcap (Correct)
B. Airsnort with Airpcap
C. Wireshark with Winpcap
D. Ethereal with Winpcap

Question 14: Correct
Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?

A. Scalability
B. Speed (Correct)
C. Key distribution
D. Security

Question 15: Correct
Which type of security feature stops vehicles from crashing through the doors of a building?

A. Turnstile
B. Bollards (Correct)
C. Mantrap
D. Receptionist

Question 16: Correct
The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:

What type of activity has been logged?

A. Port scan targeting 192.168.1.103
B. Teardrop attack targeting 192.168.1.106
C. Denial of service attack targeting 192.168.1.103
D. Port scan targeting 192.168.1.106 (Correct)

Question 17: Correct
A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?

A. Firewall-management policy
B. Acceptable-use policy
C. Remote-access policy (Correct)
D. Permissive policy

Question 18: Correct
You have successfully compromised a machine on the network and found a server that is alive on the same network. You tried to ping it but you didn’t get any response back.
What is happening?

A. ICMP could be disabled on the target server. (Correct)
B. The ARP is disabled on the target server.
C. TCP/IP doesn’t support ICMP.
D. You need to run the ping command with root privileges.

Question 19: Correct
A large mobile telephony and data network operator has a data that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems.
What is the best security policy concerning this setup?

A. Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed. (Correct)
B. As long as the physical access to the network elements is restricted, there is no need for additional measures.
C. There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.
D. The operator knows that attacks and down time are inevitable and should have a backup site.

Question 20: Correct
Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?

A. Preparation phase (Correct)
B. Containment phase
C. Identification phase
D. Recovery phase