Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What attack involves the perpetrator sending spoofed packet(s) wich contains the same destination and source IP address as the remote host, the same port for the source and destination, having the SYN flag, and targeting any open ports that are open on the remote host?

A.

Boink attack

B.

Land attack

C.

Teardrop attack

D.

Smurf attack

At which OSI/ISO layer is an encrypted authentication between a client software package and a firewall performed?

A.

Network layer

B.

Session layer

C.

Transport layer

D.

Data link layer

Within the OSI model, at what layer are some of the SLIP, CSLIP, PPP control functions provided?

A.

Data Link

B.

Transport

C.

Presentation

D.

Application

Which communication method is characterized by very high speed transmission rates that are governed by electronic clock timing signals?

A.

Asynchronous Communication.

B.

Synchronous Communication.

C.

Automatic Communication.

D.

Full duplex Communication.

Which of the following can best eliminate dial-up access through a Remote Access Server as a hacking vector?

A.

Using a TACACS+ server.

B.

Installing the Remote Access Server outside the firewall and forcing legitimate users to authenticate to the firewall.

C.

Setting modem ring count to at least 5.

D.

Only attaching modems to non-networked hosts.

Which of the following offers security to wireless communications?

A.

S-WAP

B.

WTLS

C.

WSP

D.

WDP

Why is traffic across a packet switched network difficult to monitor?

A.

Packets are link encrypted by the carrier

B.

Government regulations forbids monitoring

C.

Packets can take multiple paths when transmitted

D.

The network factor is too high

Secure Shell (SSH) is a strong method of performing:

A.

client authentication

B.

server authentication

C.

host authentication

D.

guest authentication

In this type of attack, the intruder re-routes data traffic from a network device to a personal machine. This diversion allows an attacker to gain access to critical resources and user credentials, such as passwords, and to gain unauthorized access to critical systems of an organization. Pick the best choice below.

A.

Network Address Translation

B.

Network Address Hijacking

C.

Network Address Supernetting

D.

Network Address Sniffing

What enables a workstation to boot without requiring a hard or floppy disk drive?

A.

Bootstrap Protocol (BootP).

B.

Reverse Address Resolution Protocol (RARP).

C.

Address Resolution Protocol (ARP).

D.

Classless Inter-Domain Routing (CIDR).

What IDS approach relies on a database of known attacks?

A.

Signature-based intrusion detection

B.

Statistical anomaly-based intrusion detection

C.

Behavior-based intrusion detection

D.

Network-based intrusion detection

Who is responsible for providing reports to the senior management on the effectiveness of the security controls?

A.

Information systems security professionals

B.

Data owners

C.

Data custodians

D.

Information systems auditors

The fact that a network-based IDS reviews packets payload and headers enable which of the following?

A.

Detection of denial of service

B.

Detection of all viruses

C.

Detection of data corruption

D.

Detection of all password guessing attacks

Which of the following tools is NOT likely to be used by a hacker?

A.

Nessus

B.

Saint

C.

Tripwire

D.

Nmap

Which of the following best describes signature-based detection?

A.

Compare source code, looking for events or sets of events that could cause damage to a system or network.

B.

Compare system activity for the behaviour patterns of new attacks.

C.

Compare system activity, looking for events or sets of events that match a predefined pattern of events that describe a known attack.

D.

Compare network nodes looking for objects or sets of objects that match a predefined pattern of objects that may describe a known attack.

Which conceptual approach to intrusion detection system is the most common?

A.

Behavior-based intrusion detection

B.

Knowledge-based intrusion detection

C.

Statistical anomaly-based intrusion detection

D.

Host-based intrusion detection

Which of the following reviews system and event logs to detect attacks on the host and determine if the attack was successful?

A.

host-based IDS

B.

firewall-based IDS

C.

bastion-based IDS

D.

server-based IDS

Which of the following is an issue with signature-based intrusion detection systems?

A.

Only previously identified attack signatures are detected.

B.

Signature databases must be augmented with inferential elements.

C.

It runs only on the windows operating system

D.

Hackers can circumvent signature evaluations.

Which of the following questions are least likely to help in assessing controls covering audit trails?

A.

Does the audit trail provide a trace of user actions?

B.

Are incidents monitored and tracked until resolved?

C.

Is access to online logs strictly controlled?

D.

Is there separation of duties between security personnel who administer the access control function and those who administer the audit trail?

Which of the following types of Intrusion Detection Systems uses behavioral characteristics of a system’s operation or network traffic to draw conclusions on whether the traffic represents a risk to the network or host?

A.

Network-based ID systems.

B.

Anomaly Detection.

C.

Host-based ID systems.

D.

Signature Analysis.