I2025IUpdate)IQsI&IAsI|IGradeIA|I100%I
CorrectI(VerifiedIAnswers)
Q:ISessionIsplicingIisIanIIDSIevasionItechniqueIthatIexploitsIhowIsomeIIDSsIdoInotIreconst
ructIsessionsIbeforeIperformingIpatternImatchingIonItheIdata.ITheIideaIbehindIsessionIsplicing
IisItoIsplitIdataIbetweenIseveralIpackets,IensuringIthatInoIsingleIpacketImatchesIanyIpatternsI
withinIanIIDSIsignature.IWhichItoolIcanIbeIusedItoIperformIsessionIsplicingIattacks?
Answer:
IWhisker
Q:IWhichItypeIofIvirusesItriesItoIhideIfromIantivirusIprogramsIbyIactivelyIchangingIandIcor
ruptingItheIchosenIserviceIcallIinterruptionsIwhenItheyIareIbeingIrun?
Answer:
IStealth/TunnelingIvirus
Q:IAfterIseveralIunsuccessfulIattemptsItoIextractIcryptographyIkeysIus-
IingIsoftwareImethods,IMarkIisIthinkingIaboutItryingIanotherIcode-
breakingImethodology.IWhichIofItheIfollowingIwillIbestIsuitIMarkIbasedIonIhisIunsuc-
IcessfulIattempts?
Answer:
ITrickeryIandIDeceit.
Q:IIdentifyIaIvulnerabilityIinIOpenSSLIthatIallowsIstealingItheIinformationIprotectedIunderI
normalIconditionsIbyItheISSL/TLSIencryptionIusedItoIsecureItheIInternet?
Answer:
IHeartbleedIBug
,Q:IPhilip,IaIcybersecurityIspecialist,IneedsIaItoolIthatIcanIfunctionIasIaInetworkIsniffer,Ireco
rdInetworkIactivity,IpreventIandIdetectInetworkIintrusion.IWhichIofItheIfollowingItoolsIisIsuita
bleIforIPhilip?
Answer:
ISnort
Q:IYouIhaveIbeenIassignedItheItaskIofIdefendingItheIcompanyIfromInetworkIsniffing.IWhic
hIofItheIfollowingIisItheIbestIoptionIforIthisItask?
Answer:
IUsingIencryp-ItionIprotocolsItoIsecureInetworkIcommunications.
Q:IJohn,IaIcybersecurityIspecialist,IreceivedIaIcopyIofItheIeventIlogsIfromIallIfirewalls,IIntr
usionIDetectionISystemsI(IDS)IandIproxyIserversIonIaIcompany'sInetwork.IHeItriedItoImatchI
allItheIregisteredIeventsIinIallItheIlogs,IandIheIfoundIthatItheirIsequenceIdidn'tImatch.IWhatIca
nIcauseIsuchIaIproblem?
Answer:
ITheInetworkIdevicesIareInotIallIsynchronized.
Q:IRajesh,IaInetworkIadministratorIfoundIseveralIunknownIfilesIinItheIrootIdirectoryIofIhisI
FTPIserver.IHeIwasIveryIinterestedIinIaIbinaryIfileInamedI"mfs".IRajeshIdecidedItoIcheckItheI
FTPIserverIlogsIandIfoundIthatItheIanonymousIuserIaccountIloggedIinItoItheIserver,IuploadedI
theIfilesIandIranItheIscriptIusingIaIfunctionIprovidedIbyItheIFTPIserver'sIsoftware.IAlso,IheIfo
undIthatI"mfs"IfileIisIrunningIasIaIprocessIandIitIlisteningItoIaInetworkIport.IWhatIkindIofIvul
nerabilityImustIexistItoImakeIthisIattackIpossible?
Answer:
IFileIsystemIpermissions.
I
, Q:IWhichIofItheIfollowingImethodsIisIbestIsuitedItoIprotectIconfidentialIinformationIonIyou
rIlaptopIwhichIcanIbeIstolenIwhileItravelling?
Answer:
IFullIdiskIencryption.
Q:IJohn,IaIpentester,IreceivedIanIorderItoIconductIanIinternalIauditIinItheIcompany.IOneIofIi
tsItasksIisItoIsearchIforIopenIportsIonIservers.IWhichIofItheIfollowingImethodsIisItheIbestIsol
utionIforIthisItask?
Answer:
IScanIserversIwithINmap.
Q:IWhatIactionsIshouldIyouItakeIifIyouIfindIthatItheIcompanyIthatIhired
youIisIinvolvedIwithIhumanItrafficking?
Answer:
IStopIworkIandIcontactItheIproperIlegalIauthorities.
Q:IWhichIofItheIfollowingIisIaIlogicalIcollectionIofIInternet-
connectedIdevicesIsuchIasIcomputers,IsmartphonesIorIInternetIofIthingsI(IoT)IdevicesIwhoseIs
ecurityIhasIbeenIbreachedIandIcontrolIcededItoIaIthirdIparty?
Answer:
IBotnet
Q:IWhichIofItheIfollowingIrequiresIestablishingInationalIstandardsIforIelec-
ItronicIhealthIcareItransactionsIandInationalIidentifiersIforIproviders,IhealthIinsuranceIplans,Ia
ndIemployers?
Answer:
IHIPAA