Final - Question Bank
Final - Question Bank
QUESTION OPTION1
Another name for the Wireless Ethernet
1 802.11a is- Wi-Fi2
16
What is not a role of encryption ? It is used to protect data from
unauthorized access during
17 transmission
Which of the following is a strong password
18 19thAugust88
?
The use of alert thresholding in an IDS can An attacker, working slowly
reduce the volume of repeated alerts, but enough, can evade detection by
introduces which of the following the IDS
vulnerabilities?
19
Which type of access control is used on a
router or firewall to limit network activity?
20 Mandatory
Which type of security document is written
with specific step-by-step details?
21 Paradigm
One advantage of an application-level retain state information for
firewall is the ability to each packet
22
Which security strategy requires using Three-way handshake
several, varying methods to protect IT
systems against
23 attacks?
What are common signs that a system has Patterns in time gaps in system
been compromised or hacked? and/or event logs
24
When analyzing the IDS logs, the system
administrator noticed an alert was logged
when the external router was accessed
from the administrator's computer to update
the router configuration. What type of an
alert is this?
25 Flase Positive
Which of the following is the BEST example User should access all the
for the principle of least privilege as a information stored in the business to
system security control? better execute his/her
functions
26
A security engineer has been asked to
deploy a secure remote access solution
that will allow employees to connect to the
company's internal network. Which of the
following can be implemented to minimize
the opportunity for
the man-in-the-middle attack to occur?
27 SSL
Which set of access control solutions Account and password
implements two-factor authentication?
28
What is the main advantage that a network-
based IDS/IPS system has over a host- They do not use host system
based solution? resources
29
When analyzing the IDS logs, the system
administrator notices connections from
outside of the LAN have been sending
packets where the Source IP address and
Destination IP address are the same. There
have been no alerts sent via email or
logged in the IDS. Which
type of an alert is this?
30 False positive
A newly discovered flaw in a software HTTP header
application would be considered which kind injection vulnerability
of security vulnerability?
31
Smart cards use which protocol to transfer Point to Point Protocol (PPP)
the certificate in a secure manner?
32
How can a policy help improve an By using informal networks of
employee's security awareness? communication, establishing secret
passing procedures, and
immediately terminating
employees
33
Which solution can be used to emulate
computer services, such as mail and ftp,
and to capture information related to logins Core server
or
34 actions?
During a penetration test, the tester
conducts an ACK scan using NMAP against
the external interface of the DMZ firewall.
NMAP reports that port 80 is unfiltered.
Based on this response, which type of
packet inspection is the
firewall conducting?
35 Stateless
What is the main reason the use of a stored The digital representation of the
biometric is vulnerable to an attack? biometric might not be unique, even
if the physical characteristic is
unique
36
Which type of intrusion detection system
can
monitor and alert on attacks, but cannot
37 stop them? Reactive
The intrusion detection system at a
software development company suddenly
generates multiple alerts regarding attacks
against the company's external webserver,
VPN concentrator, and DNS servers. What Investigate based on the potential
should the security team do to determine effect of the incident
which alerts
to check first?
38
What is the best defense against privilege Run services with least privileged
escalation vulnerability? accounts and implement multi-
factor authentication and
authorization
39
When an alert rule is matched in a network- Stops checking rules, sends an
based IDS like snort, the IDS does which of alert, and lets the packet continue
40 the following?
If a sender uses AES to encrypt a message
before sending to a recipient, which type of
key
41 does the sender have to use? A shared key
Which NMAP feature can a tester Fingerprinting to identify which
implement or adjust while scanning for operating systems are running on
open ports to avoid detection by the the network
network's IDS?
42
If the final set of security controls does not
eliminate all risk in a system, what could be
done next? Ignore any remaining risk
43
To reduce the attack surface of a system,
administrators should perform which of the
following processes to remove
unnecessary software, services, and
insecure configuration
settings?
44 Windowing
Which of the following is considered an
acceptable option when managing a risk?
45 Deny the risk
52
Which of the following best describes a
distributed denial-of-service attack? DoS against an entire subnet
53
WPA2 uses AES for wireless data
encryption at which of the following
55 encryption levels? 128 bit and CRC
John is scanning network IP addresses of
freeapps.com using angry IP Scanner but
couldn't find any live host. Which
application can be used to find live hosts if
ICMP has been
blocked?
56 Angry IP Scanner
keyloggers that are hidden from the victim
57 are stealth keylogger
called
Sniffing done on a switch connected
58 network is Switch sniffing
called
The time period between finding a
vulnerability and a successful patch is
60 found is called Zero-day
An NMAP scan of a server shows port 69 is Unauthenticated
61 open. What risk could this pose? access
Steve has been contacted by freeapps.com Sign a non- discloser
domain for a vulnerability audit, what is the aggrement
first step to be taken
62
What is the tool used to create ARP poison
63 attack in a switch network Wireshark
86
Enumeration is part of what phase of
87 ethical Reconnaissance
hacking?
Keyloggers are a form of .
88 Spyware
What are hybrid password attacks? An attempt to crack passwords
using words that can be found in
dictionary.
89
90 Which form of encryption does WPA use? Shared key
101 Backdoors
The attack that focuses on capturing small
packets from the network transmitted by
other computers and reading the data
content in search of any type of information
is
102 Phishing
is the action of recording the
keys struck on a keyboard, typically
covertly, so that the person using the
keyboard is unaware that their actions are
being monitored.
103 Denial of service
What is ransomware based on?
104 Fear of hackers
Switches are Limited to small
105
networks
Which of the following device copies
electrical signals from one ethernet to
106 another? Bridge
Which of the following items is not used in
107 Local Area Connections(LAN)? computer
191.75.39.24 is a Class
116 A
address.
172.16.240.256 is a class
117 A
address.
118 Telnet protocol is an example of Application layer
A device operating at the network layer is ?
119 bridge
The performance of a data communication The number of
120 network depends on users
153
Port 25 on a server is found to be open in Web server is
154 nmap configured
scan, what does it mean
How does an IPS device identify the attack Based on attack signatures
155
SSID stands for – Secure Service Identifier
156
Installation of third party applications are
prohibited on many company hardware
devices such as laptops, mobiles, etc.'
Which Mobile Device security category of
implementation
does this fall under?
157 Barrier security
VPN stands for – Visual Performance Node
158
Which phase of hacking performs actual
159 attack Reconnaissance
on a network or system?
What type of rootkit will patch, hook, or Library level rootkits
replace the version of system call in order
to hide information?
160
What is the purpose of a Denial of Service
attack? Exploit a weakness in the TCP/IP
stack
161
What are some of the most common Changing manufacturer, or
vulnerabilities that exist in a network or recommended, settings of a newly
system? installed
application.
162
What is the sequence of a TCP
163 SYN-ACK-FIN
connection?
The first phase of hacking an IT system is
compromise of which foundation of
164 security? Availability
How is IP address spoofing detected? Installing and configuring a IDS that
can read the IP header
165
Performing hacking activities with the intent
on gaining visibility for an unfair situation is
called
.
166 Cracking
What is the most important activity in Information
167 system gathering
hacking?
A packet with no flags set is which type of
168 TCP
scan?
169 Types of Sniffing Active
TELNET,FTP,TFTP protocols fall in the
170 following Transport Layer
layer of OSI model
The main function of Transport layer is Node-to-Node delivery
171
The layer responsible for end to end
172 delivery of Network layer
the entire message is
In OSI model,which of the following layer
provides error-free delivery of data ?
173 Network layer
194
When creating a security program, which
approach would be used if senior
management is supporting and enforcing A top-down approach
195 the security policy?
Which of the following ensures that updates
to policies, procedures, and configurations
are made in a controlled and documented Penetration testing
fashion?
196
For messages sent through an insecure
channel, a properly implemented digital
signature gives the receiver reason to
believe the message was sent by the
claimed sender. While using a digital
Receiver's private key
signature, the message digest is
encrypted with which key?
197
Which protocol and port number might be
needed in order to send log messages to a
log analysis tool that resides behind a UDP 415
198 firewall?
To send a PGP encrypted message, which
piece of information from the recipient must
the sender have before encrypting the Master encryption key
message?
199
A security policy will be more accepted by
employees if it is consistent and has the
support of
200 the security officer
Switching in Internet is done by using
datagram approach to packet switching at
201 the network layer
Which of the following network attacks
relies on sending an abnormally large
packet size that exceeds TCP/IP TCP hijacking
202 specifications?
Which of the following techniques does a
vulnerability scanner use in order to detect
a
203 vulnerability on a target service? Port scanning
A tester has been hired to do a web
application security test. The tester notices
that the site is dynamic and must make use
of a back end database. In order for the
tester to see if SQL injection is possible,
what is the first character that the tester
should use to attempt breaking a
valid SQL request?
209
Stephen receives an email stating that
there is a problem with the bank server and
some of the customer data is missing. The
mail is asking Stephen to click on the
internet banking link to verify if all his
details are available or not.
Stephen clicks on the link provided in email
and provides login details in the internet
banking portal but is being redirected back
to the same
login portal again. What kind of attack is
this
241
What process does a ransomware hacker Encrypting important files
perform on a user's system?
242
describe(s) users working from
243 home. SOHO
Wi-Fi1 Wi-Fi5
Expensive Fast
VPN Tunnel
Trace Netstat
255 1023
Corporate IDS
ACK FQDN
It generates many false It doesnt detect old attacks
alarms
Using key distribution public key- encryption
center
(KDC)
Delhi88 $tr0nGP@$$#9
Network packets are The IDS will not distinguish
dropped if the volume among packets originating
exceeds the threshold from different sources
Role-based Discretionary
Policy Procedure
filter packets at the network monitor tcp handshaking
level
Defense in depth
Increased amount of failed
logon events All of the above
Static IP addresses
0-day vulnerability
Extensible Authentication Point to Point Tunneling
Protocol (EAP) Protocol
(PPTP)
By sharing security secrets By implementing written
with employees, enabling security procedures,
employees to share enabling employee security
secrets, and establishing a training, and promoting the
consultative help benefits of security
line
Honeypot Layer 4 switch
Application Stateful
Authentication using a A stored biometric is no longer
stored biometric compares 'something you are' and
a copy to a copy instead of instead becomes 'something
the original to a copy. you
have'.
Passive Detective
Harvesting Hardening
non-repudiation usability
Nmap Nessus
employee
fud keylogger monitors
Patch management
Rootkit
Web portal data
leak Cleartext login
Inspect the servers physically
Binder Scanner
FALSE
Repeater Switch
Firewall Router
Hub Router
Hub Gateway
Repeater Bridge
Bitmapping Steganography
TCP SQL
Attack Exploit
ARIN APNIC
Human-based User-based
Botnet. Rootkit.
Viruses Worm
Adware Bots
Key-logger Malware
Antiware Malware
Rootkits Antiware
Exploits Scams
Fear of losing Fear of the
important files Internet
Are not used
Inefficient
presently
Repeater Hub
modem printer
64Mbps 10Kbps
WAN network
LAN MAN
Extranet Internet
5 6
Uses windowing for flow Multiplexes applications
control
UDP ICMP
16 20
B C
B C
Presentation layer transport layer
Router repeater
The transmission The hardware and
media software
Router repeater
Connection
neither
oriented
MD5 DES
reduce network
both a and b
traffic
arp udp
AA-AA-AA-AA-AA-
FF-FF-FF-FF-FF-FF
AA
255.0.0.0 255.255.0.0
Network Address Table
Subnetting
access netcraft.com
access whois.net
Shadow security
scanner Nessus
FALSE
Dictionary based attack
Hybrid attack
Configure port Configure
mirroring spanning tree
To overload a system so it is
To execute a Trojan on a no longer operational
system
Additional unused
features on commercial Utilizing open source
software packages. application code
Confidentiality Integrity
Comparing the TTL
values of the actual and Implementing a firewall to the
spoofed addresses network
Analysis Hacktivism
Cracking Escalating
passwords privileges
XMAS IDLE
Passive A&B
Process-to-process
delivery Synchronization
ADCCP TCP
110 23
21 80
22 442
24 53
21 22
Modification of Wiping of
data information
Execute Stop
MD5 RC4
Security auditing
The root CA is the recovery
The root CA stores the agent used to encrypt data
user's hash value for when a user's certificate is lost
safekeeping
coworkers
Forensic attack
Malformed session
802.1Q VLANs
Windows/system3 Windows/system3
2/SAM 2/settings
Securityfocus.com Cve.mitre.com
FALSE
worm adware
Winpcap Tcpdump
Use a numeric Use a simple password
character as password
Python C++
ARP HTTP
Torrents None
Perl Python
Db2 Postgresql
0.0.0.255 255.255.254.0
Interfaces protocols
Session Layer Presentation Layer
Session Layer Transport Layer
Layer3 Layer2
Wi-Fi6 Yes
Yes
Connection table
Scalable Yes
Authentication Yes
NBTstat Yes
1025 Yes
Yes
FIN
Yes
None of these
Yes
symmetric key
!augustdelhi Yes
Thresholding interferes with the IDS'
ability to reassemble fragmented
packets Yes
Yes
Rule-based
Yes
Process
filter specific commands, such as
http:post Yes
Yes
Covert channels
Yes
False negative
User must be able to access only the
information and resources that are
necessary for
legitimate purpose Yes
Yes
IPSec
Fingerprint scanner and retina scanner
Yes
Yes
True positive
dead-day vulnerability
Yes
Yes
Host
A stored biometric can be stolen and
used by an attacker to impersonate the
individual identified by the biometric Yes
Yes
Intuitive
Yes
A session key
Traceroute to control the path of the
packets sent during the scan
Yes
Yes
Stealthing
operability Yes
Yes
External audit
Yes
External audit
Penetration Testing
Yes
Yes
Yes
128 bit SERC
Yes
Retina
none Yes
Yes
Zombie
Tomas Yes
Sniffer Yes
Yes
None
None Yes
Yes
Yes
620; 80
Privacy Over
Protocol Yes
boost the signal between two cable
segments or wireless access points
Yes
Yes
Router
Proxy Server Yes
Switch Yes
None of the
Yes
mentioned
Wired Personal
Access Yes
To hide malicious activity on the
network. Yes
HTTP Yes
Scanning Yes
Yes
Vulnerability
DNS
Yes
Yes
Computer-based
Splog. Yes
Yes
Adware
Yes
Worms
Yes
Worms
Yes
Malware
Bots Yes
rootkit Yes
Yes
Malware
Yes
Exploits
Yes
Keylogging
Fear of spyware Yes
Yes
Passive hub
cable Yes
10Mbps Yes
SAN Yes
All Yes
Yes
All The Above
7 Yes
Is more efficient than UDP
Yes
None of these Yes
24
Yes
Switch Yes
Both Yes
Physical Yes
PGP Yes
none Yes
Windows Yes
Encrypted hash
password Yes
Remote client
access Yes
icmp Yes
Yes
Classnet
Cost Yes
A&B Yes
Yes
Yes
None
None Yes
Yes
None
None Yes
Yes
Password guessing
dns server is
configured Yes
SYN-SYN-ACK Yes
Yes
Authentication
Identify all TCP sessions that are initiated
but does not complete successfully
Yes
Yes
Exploitation
NULL Yes
none Yes
Updating and
maintanance of routing table Yes
Yes
IP Address
Backup logging Yes
Sends it back out the same interface it
received it in Yes
72 Yes
23 Yes
443 Yes
442 Yes
23
Yes
DES
Yes
All of the
mentioned Yes
Read Yes
Password Yes
Yes
SHA1 Yes
Taxonomy of
vulnerabilities Yes
They enforce strong user authentication
and audit log generation Yes
Yes
Risk assessment
Yes
none
Yes
Yes
physical layer.
Yes
Banner grabbing
Yes
Exclamation mark
Yes
Open connection
Yes
Malware attack
STP Yes
C:/Users/{User
Profile}/SAM Yes
google.com Yes
Yes
None of above
Yes
technicalinfo.net
Yes
Linux user
passwords Yes
spyware Yes
Yes
None
Yes
None
Yes
Perl
UDP Yes
ALL Yes
Java Yes
Access Yes
Scanning Yes
HTTP is a easy protocol to work
Yes
with
Application Yes
Yes
Man-in-the-middle
Skip list Yes
Yes
255,255,255,256 Yes
layer1 Yes