New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Adam works as an Incident Handler for Umbrella Inc. He has been sent to the California unit to train the members of the incident response team. As a demo project he asked members of the incident response team to perform the following actions:

Remove the network cable wires.

Isolate the system on a separate VLAN

Use a firewall or access lists to prevent communication into or out of the system.

Change DNS entries to direct traffic away from compromised system

Which of the following steps of the incident handling process includes the above actions?

A.

Identification

B.

Containment

C.

Eradication

D.

Recovery

You work as a Network Administrator for InformSec Inc. You find that the TCP port number 23476 is open on your server. You suspect that there may be a Trojan named Donald Dick installed on your server. Now you want to verify whether Donald Dick is installed on it or not. For this, you want to know the process running on port 23476, as well as the process id, process name, and the path of the process on your server. Which of the following applications will you most likely use to accomplish the task?

A.

Tripwire

B.

SubSeven

C.

Netstat

D.

Fport

You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?

A.

Idle scan

B.

TCP SYN scan

C.

XMAS scan

D.

Ping sweep scan

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

A.

Fragroute

B.

Absinthe

C.

Stick

D.

ADMutate

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

A.

Ping of death

B.

Jolt

C.

Fraggle

D.

Teardrop

You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company wants to fix potential vulnerabilities existing on the tested systems. You use Nessus as a vulnerability scanning program to fix the vulnerabilities. Which of the following vulnerabilities can be fixed using Nessus?

Each correct answer represents a complete solution. Choose all that apply.

A.

Misconfiguration (e.g. open mail relay, missing patches, etc.)

B.

Vulnerabilities that allow a remote cracker to control sensitive data on a system

C.

Vulnerabilities that allow a remote cracker to access sensitive data on a system

D.

Vulnerabilities that help in Code injection attacks

You work as a System Engineer for Cyber World Inc. Your company has a single Active Directory domain. All servers in the domain run Windows Server 2008. The Microsoft Hyper-V server role has been installed on one of the servers, namely uC1. uC1 hosts twelve virtual machines. You have been given the task to configure the Shutdown option for uC1, so that each virtual machine shuts down before the main Hyper-V server shuts down. Which of the following actions will you perform to accomplish the task?

A.

Enable the Shut Down the Guest Operating System option in the Automatic Stop Action Properties on each virtual machine.

B.

Manually shut down each of the guest operating systems before the server shuts down.

C.

Create a batch file to shut down the guest operating system before the server shuts down.

D.

Create a logon script to shut down the guest operating system before the server shuts down.

Which of the following statements are true about firewalking?

Each correct answer represents a complete solution. Choose all that apply.

A.

To use firewalking, the attacker needs the IP address of the last known gateway before the firewall and the IP address of a host located behind the firewall.

B.

In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall.

C.

A malicious attacker can use firewalking to determine the types of ports/protocols that can bypass the firewall.

D.

Firewalking works on the UDP packets.

Adam works as a sales manager for Umbrella Inc. He wants to download software from the Internet. As the software comes from a site in his untrusted zone, Adam wants to ensure that the downloaded software has not been Trojaned. Which of the following options would indicate the best course of action for Adam?

A.

Compare the file size of the software with the one given on the Website.

B.

Compare the version of the software with the one published on the distribution media.

C.

Compare the file's virus signature with the one published on the distribution.

D.

Compare the file's MD5 signature with the one published on the distribution media.

Which of the following takes control of a session between a server and a client using TELNET, FTP, or any other non-encrypted TCP/IP utility?

A.

Dictionary attack

B.

Session Hijacking

C.

Trojan horse

D.

Social Engineering