Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following proxy servers is also referred to as transparent proxies or forced proxies?

A.

Reverse proxy server

B.

Intercepting proxy server

C.

Anonymous proxy server

D.

Tunneling proxy server

Which of the following is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

A.

Security audit

B.

Corrective controls

C.

Audit trail

D.

Detective controls

Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

A.

Nikto

B.

Sniffer

C.

Snort

D.

Dsniff

Which of the following parts of IP header is used to specify the correct place of the fragment in the original un-fragmented datagram?

A.

Fragment offset

B.

Source address

C.

TTL

D.

Fragment ID

You work as a Security Administrator for Tech Perfect Inc. You have implemented and configured a web application security scanner in the company's network. It helps in the automated review of

the web applications with the defined purpose of discovering security vulnerabilities. In order to perform this task, the web application security scanner examines a number of vulnerabilities. What are these vulnerabilities?

Each correct answer represents a complete solution. Choose three.

A.

Server configuration mistakes/errors/version

B.

Specific application problems

C.

Input/Output validation

D.

Denials of service against the TCP/IP stack

Which of the following attacks sends false ICMP packets in an attempt to cripple a system using random fake Internet source addresses?

A.

Land attack

B.

SYN attack

C.

Replay attack

D.

Twinge attack

Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?

A.

IP identification number

B.

SSID

C.

MAK ID

D.

IP address

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

A.

PCAP

B.

WinPCap

C.

libpcap

D.

SysPCap

A scenario involves a pool of users with private IP addresses who need to access the Internet; however, the company has a limited number of IP addresses and needs to ensure users occupy only one public IP address.

Which technology is used to allow a pool of users to share one global IP address for Internet access?

A.

Port Address Translation

B.

Per-user Address Translation

C.

Pool Address Translation

D.

Private Address Translation

An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:

Which of the following tools can be used as a countermeasure to such an attack?

A.

Kismet

B.

Absinthe

C.

SmashGuard

D.

Obiwan