Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which firewall architecture uses two NICs with a screening router inserted between the host and the untrusted network?

A.

Deep packet inspection

B.

Packet hosting

C.

Screened host

D.

Packet filtering

All of the following steps should be taken to prevent a Web server from IIS buffer overflow attacks except for which one?

A.

Implement the IPP printing capability.

B.

Conduct frequent scans for server vulnerabilities.

C.

Install the upgrades of Microsoft service packs.

D.

Implement effective firewalls.

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows:

C:\whisker.pl -h target_IP_address

-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =

= Host: target_IP_address

= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1

mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22

+ 200 OK: HEAD /cgi-bin/printenv

John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

The countermeasure to 'printenv' vulnerability is to remove the CGI script.

B.

'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.

C.

This vulnerability helps in a cross site scripting attack.

D.

With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

A.

Secret

B.

Synchronous

C.

Asymmetric

D.

Symmetric

Which of the following colors is used for ultra secret information?

A.

Yellow

B.

Blue

C.

Red

D.

Orange

Which of the following is a valid space efficiency of RAID 3?

A.

1 - 1/n

B.

1/n

C.

1 - 2/n

D.

1

Which function of incident handling involves in-depth investigation of the incident report or incident activity to establish the priority and threat of the incident?

A.

Incident analysis

B.

Incident reporting

C.

Incident response

D.

Incident identification

You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection?

Each correct answer represents a complete solution. Choose two.

A.

MAC filtering on the router

B.

Strong password policies on workstations.

C.

Not broadcasting SSID

D.

Using either WEP or WPA encryption

E.

Hardening the server OS

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server.

Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server. Which of the following are countermeasures against a brute force attack?

Each correct answer represents a complete solution. Choose all that apply.

A.

The site should force its users to change their passwords from time to time.

B.

The site should use CAPTCHA after a specific number of failed login attempts.

C.

The site should increase the encryption key length of the password.

D.

The site should restrict the number of login attempts to only three times.

Which of the following attacks allows an attacker to recover the key in an RC4 encrypted stream from a large number of messages in that stream?

A.

Rainbow attack

B.

SYN flood attack

C.

Zero Day attack

D.

FMS attack

Which of the following generates MD5 hashes to check the MD5 value for each file processed and compares it with other MD5 strings?

A.

Chaos MD5

B.

Mat-MD5

C.

md5sum command

D.

MD5 Checksum Verifier

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. Rick, your assistant, is configuring some laptops for wireless access. For security, WEP needs to be configured for wireless communication. By mistake, Rick configures different WEP keys in a laptop than that is configured on the Wireless Access Point (WAP). Which of the following statements is true in such situation?

A.

The laptop will be able to access the wireless network but other wireless devices will be unable to communicate with it.

B.

The laptop will be able to access the wireless network but the security will be compromised.

C.

The WAP will allow the connection with the guest account's privileges.

D.

The laptop will not be able to access the wireless network.

Your company network has been infected with a virus. You have cleaned all PCs, workstations, and servers. However your network still keeps getting re-infected with the same virus. Which of the following could NOT be a cause for this?

Each correct answer represents a complete solution. Choose two.

A.

The virus is on UPS devices.

B.

Users are downloading the virus from emails.

C.

The virus is on printers.

D.

The virus has infected your network interface cards.

E.

Users have the virus on portable media such as a USB drive.

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

A.

Disaster recovery plan

B.

Business continuity plan

C.

Contingency plan

D.

Continuity of Operations Plan

You see the career section of a company's Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?

A.

Covering tracks

B.

Scanning

C.

Gaining access

D.

Reconnaissance