1.How do you defend against MAC attacks on a switch?
Disable SPAN port on the switch
Enable SNMP Trap on the switch
Configure IP security on the switch
Enable Port Security on the switch
Correct answer(s) is D
2.How do you defend against MAC attacks on a switch?
Disable SPAN port on the switch
Enable SNMP Trap on the switch
Configure IP security on the switch
Enable Port Security on the switch
Correct answer(s) is D
3.Which property or concept ensures that a hash function will not produce the same
hashed value for two different messages?
Key strength
Bit length
Entropy
Collision resistance
Correct answer(s) is D
4.Jess the hacker runs L0phtCrack's built-in sniffer utility that grabs SMB
password hashes and stores them for offline cracking. Once cracked, these passwords
can provide easy access to whatever network resources the user account has access
to. But Jess is not picking up hashes from the network.
Why?
The network protocol is configured to use SMB Signing
The physical network wire is on fibre optic cable
The network protocol is configured to use IPSEC
L0phtCrack SMB sniffing only works through Switches and not Hubs
Correct answer(s) is A
5.Which of the following are advantages of adopting a Single Sign On (SSO) system?
(Choose two.)
A reduction in password fatigue for users because they do not need to know
multiple passwords when accessing multiple applications
A reduction in network and application monitoring since all recording will be
completed at the SSO system
A reduction in system administration overhead since any user login problems can be
resolved at the SSO system
A reduction in overall risk to the system since network and application attacks
can only happen at the SSO point
Correct answer(s) is AC
6.Rootkits are kernel programs having the ability to hide themselves and cover up
traces of activities. It replaces certain operating system calls and utilities with
its own modified versions of those routines.
Which of the following rootkit modifies the boot sequence of the machine to load
themselves instead of the original virtual machine monitor or operating system?
Hypervisor level rootkit
Kernel level rootkit
Boot loader level rootkit
Library level rootkits
Correct answer(s) is A
7.Which of the following is the structure designed to verify and authenticate the
identity of individuals within the enterprise taking part in a data exchange?
SOA
Biometrics
PKI
Single sign on
Correct answer(s) is C
8.An incident investigator asks to receive a copy of the event logs from all
firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of
an organization that has experienced a possible breach of security. When the
investigator attempts to correlate the information in all of the logs, the sequence
of many of the logged events do not match up. What is the most likely cause?
The attacker altered or erased events from the logs.
Proper chain of custody was not observed while collecting the logs.
The security breach was a false positive.
The network devices are not all synchronized.
Correct answer(s) is A
9.A security analyst is performing an audit on the network to determine if there
are any deviations from the security policies in place.
The analyst discovers that a user from the IT department had a dial-out modem
installed.
Which security policy must the security analyst check to see if dial-out modems are
allowed?
Firewall-management policy
Acceptable-use policy
Remote-access policy
Permissive policy
Correct answer(s) is C
10.What do you call a pre-computed hash?
Sun tables
Apple tables
Rainbow tables
Moon tables
Correct answer(s) is C
11.Joseph has just been hired on to a contractor company of the Department of
Defense as their Senior Security Analyst.
Joseph has been instructed on the company's strict security policies that have been
implemented, and the policies that have yet to be put in place.
Per the Department of Defense, all DoD users and the users of their contractors
must use two-factor authentication to access their networks.
Joseph has been delegated the task of researching and implementing the best two-
factor authentication method for his company.
Joseph's supervisor has told him that they would like to use some type of hardware
device in tandem with a security or identifying pin number.
Joseph's company has already researched using smart cards and all the resources
needed to implement them, but found the smart cards to not be cost effective.
What type of device should Joseph use for two-factor authentication?
Biometric device
OTP
Proximity cards
Security token
Correct answer(s) is D
12.LAN Manager Passwords are concatenated to 14 bytes, and split in half. The two
halves are hashed individually. If the password is 7 characters or less, than the
second half of the hash is always:
0xAAD3B435B51404EE
0xAAD3B435B51404AA
0xAAD3B435B51404BB
0xAAD3B435B51404CC
Correct answer(s) is A
13.If an attacker's computer sends an IPID of 24333 to a zombie (Idle Scanning)
computer on a closed port, what will be the response?
The zombie computer will respond with an IPID of 24334.
The zombie computer will respond with an IPID of 24333.
The zombie computer will not send a response.
The zombie computer will respond with an IPID of 24335.
Correct answer(s) is A
14.What statement is true regarding LM hashes?
LM hashes consist in 48 hexadecimal characters.
LM hashes are based on AES128 cryptographic standard.
Uppercase characters in the password are converted to lowercase.
LM hashes are not generated when the password length exceeds 15 characters.
Correct answer(s) is D
15.Which of the following Trojans would be considered 'Botnet Command Control
Center'?
YouKill DOOM
Damen Rock
Poison Ivy
Matten Kit
Correct answer(s) is C
16.The configuration allows a wired or wireless network interface controller to
pass all traffic it receives to the central processing unit (CPU), rather than
passing only the frames that the controller is intended to receive.
Which of the following is being described?
Port forwarding
Multi-cast mode
WEP
promiscuous mode
Correct answer(s) is D
17.More sophisticated IDSs look for common shellcode signatures. But even these
systems can be bypassed, by using polymorphic shellcode.
This is a technique common among virus writers. It basically hides the true nature
of the shellcode in different disguises.
How does a polymorphic shellcode work?
They encrypt the shellcode by XORing values over the shellcode, using loader code
to decrypt the shellcode, and then executing the decrypted shellcode
They convert the shellcode into Unicode, using loader to convert back to machine
code then executing them
They reverse the working instructions into opposite order by masking the IDS
signatures
They compress shellcode into normal instructions, uncompressed the shellcode using
loader code and then executing the shellcode
Correct answer(s) is A
18.One of the effective DoS/DDoS countermeasures is 'Throttling'. Which statement
correctly defines this term?
Answers
Set up routers that access a server with logic to adjust incoming traffic to
levels that will be safe for the server to process
Providers can increase the bandwidth on critical connections to prevent them from
going down in the event of an attack
Replicating servers that can provide additional failsafe protection
Load balance each server in a multiple-server architecture
WHOOPS... Correct answer(s) is A
19.What is the least important information when you analyze a public IP address in
a security alert?
Answers
ARP
Whois
DNS
Geolocation
WHOOPS... Correct answer(s) is A
20.What is this Shellshock bash vulnerability attempting to do on this vulnerable
Linux host? env x='(){:;};echo exploit' bash -c 'cat /etc/passwd'
Answers
Change all password in passwd
Remove the passwd file.
Add new user to the passwd file
Display passwd contents to prompt
WHOOPS... Correct answer(s) is D
21.Most cases of insider abuse can be traced to individuals who are introverted,
incapable of dealing with stress or conflict, and frustrated with their job, office
politics, and lack of respect or promotion. Disgruntled employees may pass company
secrets and intellectual property to competitors for monitory benefits. Here are
some of the symptoms of a disgruntled employee:
These disgruntled employees are the biggest threat to enterprise security. How do
you deal with these
threats? (Select 2 answers)
Answers
Frequently leaves work early, arrive late or call in sick
Spends time surfing the Internet or on the phone
Responds in a confrontational, angry, or overly aggressive way to simple requests
or comments
Always negative; finds fault with everything
Limit access to the applications they can run on their desktop computers and
enforce strict work hour rules
By implementing Virtualization technology from the desktop to the data centre,
organizations can isolate different environments with varying levels of access and
security to various employees
Organizations must ensure that their corporate data is centrally managed and
delivered to users just and when needed
WHOOPS... Correct answer(s) is BC
22.Which of the following are valid types of rootkits? (Choose three.)
Answers
Hypervisor level
Network level
Kernel level
Application level
Physical level
Data access level
WHOOPS... Correct answer(s) is ACD