Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following attacks involves multiple compromised systems to attack a single target?

A.

Brute force attack

B.

Replay attack

C.

Dictionary attack

D.

DDoS attack

Which of the following wireless network security solutions refers to an authentication process in which a user can connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?

A.

Remote Authentication Dial-In User Service (RADIUS)

B.

IEEE 802.1x

C.

Wired Equivalent Privacy (WEP)

D.

Wi-Fi Protected Access 2 (WPA2)

Which of the following penetration testing phases involves gathering data from whois, DNS, and network scanning, which helps in mapping a target network and provides valuable information regarding the operating system and applications running on the systems?

A.

Post-attack phase

B.

On-attack phase

C.

Attack phase

D.

Pre-attack phase

A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS attack are as follows:

l Saturation of network resources

l Disruption of connections between two computers, thereby preventing communications between services

l Disruption of services to a specific computer

l Failure to access a Web site

l Increase in the amount of spam

Which of the following can be used as countermeasures against DoS attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Blocking undesired IP addresses

B.

Applying router filtering

C.

Disabling unneeded network services

D.

Permitting network access only to desired traffic

Which of the following is the difference between SSL and S-HTTP?

A.

SSL operates at the application layer and S-HTTP operates at the network layer.

B.

SSL operates at the application layer and S-HTTP operates at the transport layer.

C.

SSL operates at the network layer and S-HTTP operates at the application layer.

D.

SSL operates at the transport layer and S-HTTP operates at the application layer.

Which of the following techniques can be used to map 'open' or 'pass through' ports on a gateway?

A.

Traceport

B.

Tracefire

C.

Tracegate

D.

Traceroute

Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of Umbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer.

After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting.

for (( i = 0;i<11;i++ )); do dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda done

Which of the following actions does Adam want to perform by the above command?

A.

Infecting the hard disk with polymorphic virus strings.

B.

Deleting all log files present on the system.

C.

Wiping the contents of the hard disk with zeros.

D.

Making a bit stream copy of the entire hard disk for later download.

You execute the following netcat command:

c:\target\nc -1 -p 53 -d -e cmd.exe

What action do you want to perform by issuing the above command?

A.

Listen the incoming data and performing port scanning

B.

Capture data on port 53 and performing banner grabbing

C.

Capture data on port 53 and delete the remote shell

D.

Listen the incoming traffic on port 53 and execute the remote shell

Which of the following protocol loggers is used to detect ping sweep?

A.

lppi

B.

pitl

C.

dpsl

D.

ippl

Which of the following is an Internet mapping technique that relies on various BGP collectors that collect information such as routing updates and tables and provide this information publicly?

A.

AS Route Inference

B.

Path MTU discovery (PMTUD)

C.

AS PATH Inference

D.

Firewalking