Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Network Intrusion Detection systems can monitor traffic in real time on networks.

Which one of the following techniques can be very effective at avoiding proper detection?

A.

Fragmentation of packets.

B.

Use of only TCP based protocols.

C.

Use of only UDP based protocols.

D.

Use of fragmented ICMP traffic only.

While examining a log report you find out that an intrusion has been attempted by a machine whose IP address is displayed as 0xde.0xad.0xbe.0xef. It looks to you like a hexadecimal number. You perform a ping 0xde.0xad.0xbe.0xef. Which of the following IP addresses will respond to the ping and hence will likely be responsible for the intrusion?

A.

192.10.25.9

B.

10.0.3.4

C.

203.20.4.5

D.

222.273.290.239

There is some dispute between two network administrators at your company. Your boss asks you to come and meet with the administrators to set the record straight. Which of these are true about PKI and encryption?

Select the best answers.

A.

PKI provides data with encryption, compression, and restorability.

B.

Public-key encryption was invented in 1976 by Whitfield Diffie and Martin Hellman.

C.

When it comes to eCommerce, as long as you have authenticity, and authenticity, you do not need encryption.

D.

RSA is a type of encryption.

There are two types of honeypots- high and low interaction. Which of these describes a low interaction honeypot? Select the best answers.

A.

Emulators of vulnerable programs

B.

More likely to be penetrated

C.

Easier to deploy and maintain

D.

Tend to be used for production

E.

More detectable

F.

Tend to be used for research

Bob, an Administrator at XYZ was furious when he discovered that his buddy Trent, has launched a session hijack attack against his network, and sniffed on his communication, including administrative tasks suck as configuring routers, firewalls, IDS, via Telnet.

Bob, being an unhappy administrator, seeks your help to assist him in ensuring that attackers such as Trent will not be able to launch a session hijack in XYZ.

Based on the above scenario, please choose which would be your corrective measurement actions. (Choose two)

A.

Use encrypted protocols, like those found in the OpenSSH suite.

B.

Implement FAT32 filesystem for faster indexing and improved performance.

C.

Configure the appropriate spoof rules on gateways (internal and external).

D.

Monitor for CRP caches, by using IDS products.

What is the expected result of the following exploit?

A.

Opens up a telnet listener that requires no username or password.

B.

Create a FTP server with write permissions enabled.

C.

Creates a share called “sasfile” on the target system.

D.

Creates an account with a user name of Anonymous and a password of noone@nowhere.com.

All the web servers in the DMZ respond to ACK scan on port 80. Why is this happening ?

A.

They are all Windows based webserver

B.

They are all Unix based webserver

C.

The company is not using IDS

D.

The company is not using a stateful firewall

Once an intruder has gained access to a remote system with a valid username and password, the attacker will attempt to increase his privileges by escalating the used account to one that has increased privileges. such as that of an administrator. What would be the best countermeasure to protect against escalation of priveges?

A.

Give users tokens

B.

Give user the least amount of privileges

C.

Give users two passwords

D.

Give users a strong policy document

You are the security administrator for a large network. You want to prevent attackers from running any sort of traceroute into your DMZ and discover the internal structure of publicly accessible areas of the network.

How can you achieve this?

A.

Block ICMP at the firewall.

B.

Block UDP at the firewall.

C.

Both A and B.

D.

There is no way to completely block doing a trace route into this area.

WinDump is a popular sniffer which results from the porting to Windows of TcpDump for Linux. What library does it use?

A.

LibPcap

B.

WinPcap

C.

Wincap

D.

None of the above

Bart is looking for a Windows NT/2000/XP command-line tool that can be used to assign, display, or modify ACL’s (access control lists) to files or folders and also one that can be used within batch files.

Which of the following tools can be used for that purpose? (Choose the best answer)

A.

PERM.exe

B.

CACLS.exe

C.

CLACS.exe

D.

NTPERM.exe

Melissa is a virus that attacks Microsoft Windows platforms.

To which category does this virus belong?

A.

Polymorphic

B.

Boot Sector infector

C.

System

D.

Macro

Which of the following is one of the key features found in a worm but not seen in a virus?

A.

The payload is very small, usually below 800 bytes.

B.

It is self replicating without need for user intervention.

C.

It does not have the ability to propagate on its own.

D.

All of them cannot be detected by virus scanners.

What is the best means of prevention against viruses?

A.

Assign read only permission to all files on your system.

B.

Remove any external devices such as floppy and USB connectors.

C.

Install a rootkit detection tool.

D.

Install and update anti-virus scanner.

ETHER: Destination address : 0000BA5EBA11 ETHER: Source address :

An employee wants to defeat detection by a network-based IDS application. He does not want to attack the system containing the IDS application. Which of the following strategies can be used to defeat detection by a network-based IDS application?

A.

Create a SYN flood

B.

Create a network tunnel

C.

Create multiple false positives

D.

Create a ping flood

A client has approached you with a penetration test requirements. They are concerned with the possibility of external threat, and have invested considerable resources in protecting their Internet exposure. However, their main concern is the possibility of an employee elevating his/her privileges and gaining access to information outside of their respective department.

What kind of penetration test would you recommend that would best address the client’s concern?

A.

A Black Box test

B.

A Black Hat test

C.

A Grey Box test

D.

A Grey Hat test

E.

A White Box test

F.

A White Hat test

Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn an interactive shell and plans to deface the main web page. He first attempts to use the "echo" command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tries to overwrite it with another page in which also he remains unsuccessful. What is the probable cause of Bill's problem?

A.

You cannot use a buffer overflow to deface a web page

B.

There is a problem with the shell and he needs to run the attack again

C.

The HTML file has permissions of read only

D.

The system is a honeypot

RC4 is known to be a good stream generator. RC4 is used within the WEP standard on wireless LAN. WEP is known to be insecure even if we are using a stream cipher that is known to be secured.

What is the most likely cause behind this?

A.

There are some flaws in the implementation.

B.

There is no key management.

C.

The IV range is too small.

D.

All of the above.

E.

None of the above.

You may be able to identify the IP addresses and machine names for the firewall, and the names of internal mail servers by:

A.

Sending a mail message to a valid address on the target network, and examining the header information generated by the IMAP servers

B.

Examining the SMTP header information generated by using the –mx command parameter of DIG

C.

Examining the SMTP header information generated in response to an e-mail message sent to an invalid address

D.

Sending a mail message to an invalid address on the target network, and examining the header information generated by the POP servers

Which of the following Registry location does a Trojan add entries to make it persistent on Windows 7? (Select 2 answers)

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\System32\CurrentVersion\ Run

C.

HKEY_CURRENT_USER\Software\Microsoft\Windows\System32\CurrentVersion\Run

D.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run