Questions Fully Solved Graded A+.
Why should the security analyst disable/remove unnecessary ISAPI filters?
A. To defend against social engineering attacks
B. To defend against webserver attacks
C. To defend against jailbreaking.
D.To defend against wireless attacks - Answer To defend against webserver attacks
What is the proper response for a NULL scan if the port is open? - Answer No response
One of your team members has asked you to analyze the following SOA record. What is the
version? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800
2400.) (Choose four.)
A. 200303028
B. 3600
C.60480
D. 2400
E. 60
F.4800 - Answer 200303028
You are tasked to perform a penetration test. While you are performing information gathering,
you find an employee list in Google. You find the receptionist's email, and you send her an email
changing the source email to her boss's email (boss@company). In this email, you ask for a pdf
with information. She reads your email and sends back a pdf with links. You exchange the pdf
links with your malicious links (these links contain malware) and send back the modified pdf,
saying that the links don't work. She reads your email, opens the links, and her machine gets
infected. You now have access to the company network. What testing method did you use? -
Answer Social engineering
Which type of security feature stops vehicles from crashing through the doors of a building? -
Answer Bollards
,Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of
communication? - Answer 123
Bob is acknowledged as a hacker of repute and is popular among visitors of "underground"
sites.
Bob is willing to share his knowledge with those who are willing to learn, and many have
expressed their interest in learning from him. However, this knowledge has a risk associated
with it, as it can be used for malevolent attacks as well.
In this context, what would be the most effective method to bridge the knowledge gap between
the "black" hats or crackers and the "white" hats or computer security professionals? (Choose
the test answer.) - Answer Educate everyone with books, articles and training on risk analysis,
vulnerabilities and safeguards.
Which mode of IPSec should you use to assure security and confidentiality of data within the
same LAN? - Answer ESP transport mode
What is the minimum number of network connections in a multihomed firewall - Answer 3
Steve, a scientist who works in a governmental security agency, developed a technological
solution to identify people based on walking patterns and implemented this approach to a
physical control access.
A camera captures people walking and identifies the individuals using Steve's approach.
After that, people must approximate their RFID badges. Both the identifications are required to
open the door. In this case, we can say: - Answer The solution implements the two
authentication factors: physical object and physical characteristic
You are the Network Admin, and you get a complaint that some of the websites are no longer
accessible. You try to ping the servers and find them to be reachable. Then you type the IP
address and then you try on the browser, and find it to be accessible. But they are not
accessible when you try using the URL.
What may be the problem? - Answer Traffic is Blocked on UDP Port 53
A bank stores and processes sensitive privacy information related to home loans. However,
auditing has never been enabled on the system. What is the first step that the bank should take
before enabling the audit feature? - Answer Determine the impact of enabling the audit
feature.
, A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the
SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.
However, he is unable to capture any logons though he knows that other users are logging in.
What do you think is the most likely reason behind this? - Answer Kerberos is preventing it.
One of your team members has asked you to analyze the following SOA record. What is the TTL?
Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.) -
Answer 2400
Which DNS resource record can indicate how long any "DNS poisoning" could last? - Answer
Soa
Which of the following is a low-tech way of gaining unauthorized access to systems? - Answer
Social Engineering
Which of the following is a component of a risk assessment? - Answer Administrative
safeguards
Let's imagine three companies (A, B and C), all competing in a challenging global environment.
Company A and B are working together in developing a product that will generate a major
competitive advantage for them. Company A has a secure DNS server while company B has a
DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B,
company C gains access to outgoing e-mails from company B. How do you prevent DNS
spoofing? - Answer Install DNS Anti-spoofing
To determine if a software program properly handles a wide range of invalid input, a form of
automated testing can be used to randomly generate invalid input in an attempt to crash the
program.
What term is commonly used when referring to this type of testing? - Answer Fuzzing
A large company intends to use Blackberry for corporate mobile phones and a security analyst is
assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to
demonstrate how an attacker could circumvent perimeter defenses and gain access to the
Prometric Online Testing - Reports
https://ibt1.prometric.com/users/custom/report_queue/rq_str... corporate network. What tool
should the analyst use to perform a Blackjacking attack? - Answer BBProxy