Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You are gathering competitive intelligence on XYZ.com. You notice that they have jobs listed on a few Internet job-hunting sites. There are two job postings for network and system administrators. How can this help you in footprint the organization?

A.

The IP range used by the target network

B.

An understanding of the number of employees in the company

C.

How strong the corporate security policy is

D.

The types of operating systems and applications being used.

Symmetric encryption algorithms are known to be fast but present great challenges on the key management side. Asymmetric encryption algorithms are slow but allow communication with a remote host without having to transfer a key out of band or in person. If we combine the strength of both crypto systems where we use the symmetric algorithm to encrypt the bulk of the data and then use the asymmetric encryption system to encrypt the symmetric key, what would this type of usage be known as?

A.

Symmetric system

B.

Combined system

C.

Hybrid system

D.

Asymmetric system

Bart is looking for a Windows NT/2000/XP command-line tool that can be used to assign, display, or modify ACL’s (access control lists) to files or folders and also one that can be used within batch files.

Which of the following tools can be used for that purpose? (Choose the best answer)

A.

PERM.exe

B.

CACLS.exe

C.

CLACS.exe

D.

NTPERM.exe

In an attempt to secure his wireless network, Bob implements a VPN to cover the wireless communications. Immediately after the implementation, users begin complaining about how slow the wireless network is. After benchmarking the network’s speed. Bob discovers that throughput has dropped by almost half even though the number of users has remained the same.

Why does this happen in the VPN over wireless implementation?

A.

The stronger encryption used by the VPN slows down the network.

B.

Using a VPN with wireless doubles the overhead on an access point for all direct client to access point communications.

C.

VPNs use larger packets then wireless networks normally do.

D.

Using a VPN on wireless automatically enables WEP, which causes additional overhead.

What is SYSKEY # of bits used for encryption?

A.

40

B.

64

C.

128

D.

256

You want to carry out session hijacking on a remote server. The server and the client are communicating via TCP after a successful TCP three way handshake. The server has just received packet #120 from the client. The client has a receive window of 200 and the server has a receive window of 250.

Within what range of sequence numbers should a packet, sent by the client fall in order to be accepted by the server?

A.

200-250

B.

121-371

C.

120-321

D.

121-231

E.

120-370

What makes web application vulnerabilities so aggravating? (Choose two)

A.

They can be launched through an authorized port.

B.

A firewall will not stop them.

C.

They exist only on the Linux platform.

D.

They are detectable by most leading antivirus software.

How many bits encryption does SHA-1 use?

A.

64 bits

B.

128 bits

C.

160 bits

D.

256 bits

Which of the following is most effective against passwords?

Select the Answer:

A.

Dictionary Attack

B.

BruteForce attack

C.

Targeted Attack

D.

Manual password Attack

What do you call a system where users need to remember only one username and password, and be authenticated for multiple services?

A.

Simple Sign-on

B.

Unique Sign-on

C.

Single Sign-on

D.

Digital Certificate

You are attempting to map out the firewall policy for an organization. You discover your target system is one hop beyond the firewall. Using hping2, you send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024. What is this process known as?

A.

Footprinting

B.

Firewalking

C.

Enumeration

D.

Idle scanning

Bill is attempting a series of SQL queries in order to map out the tables within the database that he is trying to exploit.

Choose the attack type from the choices given below.

A.

Database Fingerprinting

B.

Database Enumeration

C.

SQL Fingerprinting

D.

SQL Enumeration

You have just installed a new Linux file server at your office. This server is going to be used by several individuals in the organization, and unauthorized personnel must not be able to modify any data.

What kind of program can you use to track changes to files on the server?

A.

Network Based IDS (NIDS)

B.

Personal Firewall

C.

System Integrity Verifier (SIV)

D.

Linux IP Chains

Statistics from cert.org and other leading security organizations has clearly showed a steady rise in the number of hacking incidents perpetrated against companies.

What do you think is the main reason behind the significant increase in hacking attempts over the past years?

A.

It is getting more challenging and harder to hack for non technical people.

B.

There is a phenomenal increase in processing power.

C.

New TCP/IP stack features are constantly being added.

D.

The ease with which hacker tools are available on the Internet.

Which of the following attacks takes best advantage of an existing authenticated connection?

A.

Spoofing

B.

Session Hijacking

C.

Password Sniffing

D.

Password Guessing

When a malicious hacker identifies a target and wants to eventually compromise this target, what would be among the first steps that he would perform? (Choose the best answer)

A.

Cover his tracks by eradicating the log files and audit trails.

B.

Gain access to the remote computer in order to conceal the venue of attacks.

C.

Perform a reconnaissance of the remote target for identical of venue of attacks.

D.

Always begin with a scan in order to quickly identify venue of attacks.

Which of the following snort rules look for FTP root login attempts?

A.

alert tcp -> any port 21 (msg:"user root";)

B.

alert tcp -> any port 21 (message:"user root";)

C.

alert ftp -> ftp (content:"user password root";)

D.

alert tcp any any -> any any 21 (content:"user root";)

WEP is used on 802.11 networks, what was it designed for?

A.

WEP is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what it usually expected of a wired LAN.

B.

WEP is designed to provide strong encryption to a wireless local area network (WLAN) with a lever of integrity and privacy adequate for sensible but unclassified information.

C.

WEP is designed to provide a wireless local area network (WLAN) with a level of availability and privacy comparable to what is usually expected of a wired LAN.

D.

WEOP is designed to provide a wireless local area network (WLAN) with a level of privacy comparable to what it usually expected of a wired LAN.

StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's /GS option use _____ defense against buffer overflow attacks.

A.

Canary

B.

Hex editing

C.

Format checking

D.

Non-executing stack

Peter is a Linux network admin. As a knowledgeable security consultant, he turns to you to look for help on a firewall. He wants to use Linux as his firewall and use the latest freely available version that is offered. What do you recommend?

Select the best answer.

A.

Ipchains

B.

Iptables

C.

Checkpoint FW for Linux

D.

Ipfwadm