Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following Trojans would be considered 'Botnet Command Control Center'?

A.

YouKill DOOM

B.

Damen Rock

C.

Poison Ivy

D.

Matten Kit

Joseph has just been hired on to a contractor company of the Department of Defense as their Senior Security Analyst. Joseph has been instructed on the company's strict security policies that have been implemented, and the policies that have yet to be put in place. Per the Department of Defense, all DoD users and the users of their contractors must use two-factor authentication to access their networks. Joseph has been delegated the task of researching and implementing the best two-factor authentication method for his company. Joseph's supervisor has told him that they would like to use some type of hardware device in tandem with a security or identifying pin number. Joseph's company has already researched using smart cards and all the resources needed to implement them, but found the smart cards to not be cost effective. What type of device should Joseph use for two-factor authentication?

A.

Biometric device

B.

OTP

C.

Proximity cards

D.

Security token

Attackers send an ACK probe packet with random sequence number, no response means port is filtered (Stateful firewall is present) and RST response means the port is not filtered. What type of Port Scanning is this?

A.

RST flag scanning

B.

FIN flag scanning

C.

SYN flag scanning

D.

ACK flag scanning

You are the CIO for Avantes Finance International, a global finance company based in Geneva. You are responsible for network functions and logical security throughout the entire corporation. Your company has over 250 servers running Windows Server, 5000 workstations running Windows Vista, and 200 mobile users working from laptops on Windows 7.

Last week, 10 of your company's laptops were stolen from salesmen while at a conference in Amsterdam. These laptops contained proprietary company information. While doing damage assessment on the possible public relations nightmare this may become, a news story leaks about the stolen laptops and also that sensitive information from those computers was posted to a blog online.

What built-in Windows feature could you have implemented to protect the sensitive information on these laptops?

A.

You should have used 3DES which is built into Windows

B.

If you would have implemented Pretty Good Privacy (PGP) which is built into Windows, the sensitive information on the laptops would not have leaked out

C.

You should have utilized the built-in feature of Distributed File System (DFS) to protect the sensitive information on the laptops

D.

You could have implemented Encrypted File System (EFS) to encrypt the sensitive files on the laptops

How does a denial-of-service attack work?

A.

A hacker prevents a legitimate user (or group of users) from accessing a service

B.

A hacker uses every character, word, or letter he or she can think of to defeat authentication

C.

A hacker tries to decipher a password by using a system, which subsequently crashes the network

D.

A hacker attempts to imitate a legitimate user by confusing a computer or even another person

Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Servers.

A.

true

B.

false

Study the following exploit code taken from a Linux machine and answer the questions below:

echo “ingreslock stream tcp nowait root /bin/sh sh –I" > /tmp/x;

/usr/sbin/inetd –s /tmp/x;

sleep 10;

/bin/ rm –f /tmp/x AAAA…AAA

In the above exploit code, the command “/bin/sh sh –I" is given.

What is the purpose, and why is ‘sh’ shown twice?

A.

The command /bin/sh sh –i appearing in the exploit code is actually part of an inetd configuration file.

B.

The length of such a buffer overflow exploit makes it prohibitive for user to enter manually.

The second ‘sh’ automates this function.

C.

It checks for the presence of a codeword (setting the environment variable) among the environment variables.

D.

It is a giveaway by the attacker that he is a script kiddy.

When working with Windows systems, what is the RID of the true administrator account?

A.

500

B.

501

C.

512

D.

1001

E.

1024

F.

1000

A program that defends against a port scanner will attempt to:

A.

Sends back bogus data to the port scanner

B.

Log a violation and recommend use of security-auditing tools

C.

Limit access by the scanning system to publicly available ports only

D.

Update a firewall rule in real time to prevent the port scan from being completed

What are the differences between SSL and S-HTTP?

A.

SSL operates at the network layer and S-HTTP operates at the application layer

B.

SSL operates at the application layer and S-HTTP operates at the network layer

C.

SSL operates at the transport layer and S-HTTP operates at the application layer

D.

SSL operates at the application layer and S-HTTP operates at the transport layer

An Evil Cracker is attempting to penetrate your private network security. To do this, he must not be seen by your IDS, as it may take action to stop him. What tool might he use to bypass the IDS?

Select the best answer.

A.

Firewalk

B.

Manhunt

C.

Fragrouter

D.

Fragids

When working with Windows systems, what is the RID of the true administrator account?

A.

500

B.

501

C.

1000

D.

1001

E.

1024

F.

512

Which of the following is NOT true of cryptography?

A.

Science of protecting information by encoding it into an unreadable format

B.

Method of storing and transmitting data in a form that only those it is intended for can read and process

C.

Most (if not all) algorithms can be broken by both technical and non-technical means

D.

An effective way of protecting sensitive information in storage but not in transit

Eve decides to get her hands dirty and tries out a Denial of Service attack that is relatively new to her. This time she envisages using a different kind of method to attack Brownies Inc. Eve tries to forge the packets and uses the broadcast address. She launches an attack similar to that of fraggle. What is the technique that Eve used in the case above?

A.

Smurf

B.

Bubonic

C.

SYN Flood

D.

Ping of Death

If you send a SYN to an open port, what is the correct response?(Choose all correct answers.

A.

SYN

B.

ACK

C.

FIN

D.

PSH

Rebecca has noted multiple entries in her logs about users attempting to connect on ports that are either not opened or ports that are not for public usage. How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by using one of the built-in Linux Operating System tools?

A.

Ensure all files have at least a 755 or more restrictive permissions.

B.

Configure rules using ipchains.

C.

Configure and enable portsentry on his server.

D.

Install an intrusion detection system on her computer such as Snort.

You have performed the traceroute below and notice that hops 19 and 20 both show the same IP address.

What can be inferred from this output?

A.

An application proxy firewall

B.

A stateful inspection firewall

C.

A host based IDS

D.

A Honeypot

A particular database threat utilizes a SQL injection technique to penetrate a target system. How would an attacker use this technique to compromise a database?

A.

An attacker uses poorly designed input validation routines to create or alter SQL commands to gain access to unintended data or execute commands of the database

B.

An attacker submits user input that executes an operating system command to compromise a target system

C.

An attacker gains control of system to flood the target system with requests, preventing legitimate users from gaining access

D.

An attacker utilizes an incorrect configuration that leads to access with higher-than-expected privilege of the database

Jim’s organization has just completed a major Linux roll out and now all of the organization’s systems are running the Linux 2.5 kernel. The roll out expenses has posed constraints on purchasing other essential security equipment and software. The organization requires an option to control network traffic and also perform stateful inspection of traffic going into and out of the DMZ.

Which built-in functionality of Linux can achieve this?

A.

IP Tables

B.

IP Chains

C.

IP Sniffer

D.

IP ICMP

Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. What authentication mechanism is being followed here?

A.

no authentication

B.

single key authentication

C.

shared key authentication

D.

open system authentication