ANSWERS
Which of the following tools is a command-line vulnerability
|\ |\ |\ |\ |\ |\ |\ |\ |\
scanner that scans web servers for dangerous files/CGIs?
|\ |\ |\ |\ |\ |\ |\
A) Snort
|\
B) Kon-Boot
|\
C) John the Ripper
|\ |\ |\
D) Nikto - CORRECT ANSWERS ✔✔Nikto
|\ |\ |\ |\ |\
Michael, a technical specialist, discovered that the laptop of one
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
of the employees connecting to a wireless point couldn't access
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
the internet, but at the same time, it can transfer files locally. He
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
checked the IP address and the default gateway. They are both
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
on 192.168.1.0/24. Which of the following caused the problem?
|\ |\ |\ |\ |\ |\ |\ |\
A) The laptop is using an invalid IP address
|\ |\ |\ |\ |\ |\ |\ |\
B) The laptop and the gateway are not on the same network
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
C) The laptop isn't using a private IP address
|\ |\ |\ |\ |\ |\ |\ |\ |\
D) The gateway is not routing to a public IP address - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔The gateway is not routing to a public IP address
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
Josh, a security analyst, wants to choose a tool for himself to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
examine links between data. One of the main requirements is to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
,present data using graphs and link analysis. Which of the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
following tools will meet John's requirements?
|\ |\ |\ |\ |\
A) Palantir
|\
B) Maltego
|\
C) Analyst's Notebook
|\ |\
D) Metasploit - CORRECT ANSWERS ✔✔Maltego
|\ |\ |\ |\ |\
What describes two-factor authentication for a credit card (using
|\ |\ |\ |\ |\ |\ |\ |\ |\
a card and pin)?
|\ |\ |\
A) Something you know and something you are
|\ |\ |\ |\ |\ |\ |\ |\
B) Something you have and something you know
|\ |\ |\ |\ |\ |\ |\
C) Something you are and something you remember
|\ |\ |\ |\ |\ |\ |\ |\
D) Something you have and something you are - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Something you have and something you know
|\ |\ |\ |\ |\ |\ |\
Identify a vulnerability in OpenSSL that allows stealing the
|\ |\ |\ |\ |\ |\ |\ |\ |\
information protected under normal conditions by the SSL/TLS
|\ |\ |\ |\ |\ |\ |\ |\
encryption used to secure the internet? |\ |\ |\ |\ |\
A) SSL/TLS Renegotiation Vulnerability
|\ |\ |\ |\
B) POODLE
|\
C) Heartbleed Bug
|\ |\
D) Shellshock - CORRECT ANSWERS ✔✔Heartbleed Bug
|\ |\ |\ |\ |\ |\
,You make a series of interactive queries, choosing subsequent
|\ |\ |\ |\ |\ |\ |\ |\ |\
plaintexts based on the information from the previous encryption.
|\ |\ |\ |\ |\ |\ |\ |\
What type of attack are you trying to perform?
|\ |\ |\ |\ |\ |\ |\ |\ |\
A) Adaptive chosen-plaintext attack
|\ |\ |\
B) Ciphertext-only attack
|\ |\ |\
C) Known-plaintext attack
|\ |\
D) Chosen-plaintext attack - CORRECT ANSWERS ✔✔Adaptive
|\ |\ |\ |\ |\ |\ |\
chosen-plaintext attack |\
Which of the following does not apply to IPsec?
|\ |\ |\ |\ |\ |\ |\ |\
A) Provides authentication
|\ |\ |\
B) Use key exchange
|\ |\ |\ |\
C) Encrypts the payloads
|\ |\ |\ |\
D) Work at the Data Link Layer - CORRECT ANSWERS ✔✔Work at
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
the Data Link Layer
|\ |\ |\
Alex, a cybersecurity specialist, received a task from the head to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
scan open ports. One of the main conditions was to use the most
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
reliable type of TCP scanning. Which of the following types of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
scanning would Alex use? |\ |\ |\
A) NULL Scan
|\ |\ |\
B) Half-open Scan
|\ |\ |\
C) TCP Connect/Full Open Scan
|\ |\ |\ |\ |\
, D) Xmas Scan - CORRECT ANSWERS ✔✔TCP Connect/Full Open
|\ |\ |\ |\ |\ |\ |\ |\ |\
Scan
Which of the following Nmap options will you use if you want to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
scan fewer ports than the default?
|\ |\ |\ |\ |\ |\
A) -p
|\
B) -sP
|\
C) -T
|\
D) -F - CORRECT ANSWERS ✔✔-F
|\ |\ |\ |\ |\
You conduct an investigation and finds out that the browser of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
one of your employees sent malicious request that the employee
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
knew nothing about. Identify the web page vulnerability that the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
attacker used to attack your employee?
|\ |\ |\ |\ |\
A) Cross-Site Request Forgery (CSRF)
|\ |\ |\ |\
B) Command Injection Attacks
|\ |\ |\ |\
C) File Inclusion Attack
|\ |\ |\ |\
D) Hidden Field Manipulation Attack - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\
✔✔Cross-Site Request Forgery (CSRF) |\ |\ |\
Which of the following program attack both the boot sector and
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
executable files? |\ |\
A) Stealth virus
|\ |\ |\