Which of the following would be the best example of a deterrent control? correct answers A
guard posted outside the door
Enacted in 2002, this U.S. law requires every Federal agency to implement information security
programs, including significant reporting on compliance and accreditation. Which of the
following is the best choice for this definition? correct answers FISMA
Brad has done some research and determined a certain set of systems on his network fail once
every ten years. The purchase price for each of these systems is $1200. Additionally, Brad
discovers the administrators on staff, who earn $50 an hour, estimate five hours to replace a
machine. Five employees, earning $25 an hour, depend on each system and will be completely
unproductive while it is down. If you were to ask Brad for an ALE on these devices, what should
he answer with? correct answers $207.50
An ethical hacker is hired to test the security of a business network. The CEH is given no prior
knowledge of the network and has a specific framework in which to work, defining boundaries,
nondisclosure agreements, and the completion date. Which of the following is a true statement?
correct answers A white hat is attempting a black-box test.
When an attack by a hacker is politically motivated, the hacker is said to be participating in
which of the following? correct answers Hactivism
Two hackers attempt to crack a company's network resource security. One is considered an
ethical hacker, whereas the other is not. What distinguishes the ethical hacker from the
"cracker"? correct answers The ethical hacker always obtains written permission before testing.
In which stage of an ethical hack would the attacker actively apply tools and techniques to gather
more in-depth information on the targets? correct answers Scanning and enumeration
Which type of attack is generally conducted as an inside attacker with elevated
,privileges on the resources? correct answers White box
Which of the following Common Criteria processes refers to the system or
product being tested? correct answers TOE
Your company has a document that spells out exactly what employees are allowed
to do on their computer systems. It also defines what is prohibited and what
consequences await those who break the rules. A copy of this document is signed
by all employees prior to their network access. Which of the following best
describes this policy? correct answers Information Security Policy
Sally is a member of a pen test team newly hired to test a bank's security. She
begins searching for IP addresses the bank may own by searching public records
on the Internet. She also looks up news articles and job postings to discover
information that may be valuable. What phase of the pen test is Sally working? correct answers
Assessment
Joe is a security engineer for a firm. His company downsizes, and Joe discovers he
will be laid off within a short amount of time. Joe plants viruses and sets about
destroying data and settings throughout the network, with no regard to being
caught. Which type of hacker is Joe considered to be? correct answers Suicide hacker
Elements of security include confidentiality, integrity, and availability. Which
technique provides for integrity? correct answers Hashing
Which of the following best describes an effort to identify systems that are critical
for continuation of operation for the organization? correct answers BIA
, Which of the following would be the best choice for footprinting restricted
URLs and OS information from a target? correct answers Netcraft
While footprinting a network, you successfully perform a zone transfer.
Which DNS record in the zone transfer indicates the company's e-mail server? correct answers
MX
Which of the following best describes the role that the U.S. Computer Security
Incident Response Team (CSIRT) provides? correct answers A reliable and consistent point of
contact for all incident response services for
associates of the Department of Homeland Security
An SOA record gathered from a zone transfer is shown here:
@ IN SOA DNSRV1.anycomp.com. postmaster.anycomp.com. (
4 ; serial number
3600 ; refresh [1h]
600 ; retry [10m]
86400 ; expire [1d]
3600 ) ; min TTL [1h]
What is the name of the authoritative DNS server for the domain, and how often
will secondary servers check in for updates? correct answers DNSRV1.anycomp.com, 3,600
seconds
A security peer is confused about a recent incident. An attacker successfully
accessed a machine in the organization and made off with some sensitive data.
A full vulnerability scan was run immediately following the theft, and nothing