Which of the following is an asymmetric encryption algorithm?
Which of the following safes are large enough to allow a person to enter?
Which of the following statements about buffer overflow is true?
Which of the following devices reads the destination's MAC address from each incoming data packet and forwards the data packet to its destination?
Which of the following records everything a person types using the keyboard?
This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.
Samantha works as an Ethical Hacker for we-are-secure Inc. She wants to test the security of the weare- secure server for DoS attacks. She sends large number of ICMP ECHO packets to the target computer. Which of the following DoS attacking techniques will she use to accomplish the task?
Which of the following terms refers to a momentary low voltage?
Which of the following are the causes of power noise?
Each correct answer represents a complete solution. Choose two.
You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?
Which of the following reads and writes data across network connections by using the TCP/IP protocol?
Which of the following statements is true about auditing?
Which of the following protocols is used for sending e-mail messages between e-mail servers?
Which of the following is a signature-based intrusion detection system (IDS) ?
How many keys are used to encrypt data in symmetric encryption?
Which of the following is the method of hiding data within another media type such as graphic or document?
Which of the following are the basic architectures of microprocessors used in modern computers?
Each correct answer represents a complete solution. Choose two.
You are installing Windows 2000 Server. You decide to use RAID-5 volume disk configuration for fault tolerance. What is the minimum number of disk drives required for implementing RAID-5 volumes?
Which of the following protocols allows Cisco devices to acquire and utilize digital certificates from Certification Authorities (CAs)?
Which of the following OSI model layers handles translation of data into standard format, data compression, and decompression?
The 802.11b wireless standard has a data transfer speed of up to ________.
Which of the following rated systems of the Orange book has mandatory protection of the TCB?
Which of the following devices reads the destination's MAC address from each incoming data packet and forwards the data packet to its destination?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?
What are packet sniffers?
Which of the following protocols is used to establish a secure TELNET session over TCP/IP?
Which of the following is a program that monitors data packets traveling across a network?
Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.
What does TACACS stand for?
Which of the following statements about DES (Data Encryption Standard) is true?
Which of the following types of computers is used for attracting potential intruders?
Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?
Which of the following are the phases of the Certification and Accreditation (C&A) process?
Each correct answer represents a complete solution. Choose two.
Which of the following rated systems of the Orange book has mandatory protection of the TCB?
Identify whether the given statement is true or false.
"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."
Which of the following protocols provides maintenance and error reporting function?
Which of the following should propose applicable and effective security controls for managing the risks?
Which of the following types of fire comes under Class K fire?
How many voice channels are available in a T2 line?
Which of the following encryption methods comes under symmetric encryption algorithm?
Each correct answer represents a complete solution. Choose three.
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Which of the following protocols transmits user credentials as plaintext?
Which of the following is a reason to implement security logging on a DNS server?
Which of the following are examples of passive attacks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients?
Which of the following processes is known as Declassification?
Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?
Which of the following is NOT a countermeasure against a spoofing attack?
Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?
Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of www.we-are-secure.com. The company has provided the following information about the infrastructure of its network:
•Network diagrams of the we-are-secure infrastructure
•Source code of the security tools
•IP addressing information of the we-are-secure network
Which of the following testing methodologies is we-are-secure.com using to test the security of its network?
Which of the following is a duplicate of the original site of an organization, with fully working systems as well as near-complete backups of user data?
SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?
Each correct answer represents a complete solution. Choose all that apply.
Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.
Which of the following DoS attacks is Maria using to accomplish her task?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. While examining a log report, he finds that an intrusion has been attempted by an attacker whose IP address is 0x40.0x3A.0x2B.0xE6. Which of the following decimal IP addresses will respond to the ping on the above Hexadecimal IP address?
Brutus is a password cracking tool that can be used to crack the following authentications:
•HTTP (Basic Authentication)
•HTTP (HTML Form/CGI)
•POP3 (Post Office Protocol v3)
•FTP (File Transfer Protocol)
•SMB (Server Message Block)
•Telnet
Which of the following attacks can be performed by Brutus for password cracking?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following defines the communication link between a Web server and Web applications?
Which of the following statements about smurf is true?
Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this?
Each correct answer represents a part of the solution. Choose three.
Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?
Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.
Which of the following are the differences between PPTP and L2TP?
Each correct answer represents a complete solution. Choose three.
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He recommends a disk encryption tool to encrypt the secret files of the We-are-secure server. He presents a report to the We-are-secure authorities as given below:
Which of the following tools is John recommending for disk encryption on the We-are-secure server?
You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this?
Each correct answer represents a complete solution. Choose two.
Which of the following are the application layer protocols for security?
Each correct answer represents a complete solution. Choose three.
Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?
John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.
Original cookie values:
ItemID1=2
ItemPrice1=900
ItemID2=1
ItemPrice2=200
Modified cookie values:
ItemID1=2
ItemPrice1=1
ItemID2=1
ItemPrice2=1
Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.
Which of the following hacking techniques is John performing?
Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?
Which of the following is the most secure authentication method?
Which of the following are the centralized administration technologies?
Each correct answer represents a complete solution. Choose all that apply.
Which methods help you to recover your data in the event of a system or hard disk failure?
Each correct answer represents a complete solution. Choose two.
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He wants to test the effect of a virus on the We-are-secure server. He injects the virus on the server and, as a result, the server becomes infected with the virus even though an established antivirus program is installed on the server. Which of the following do you think are the reasons why the antivirus installed on the server did not detect the virus injected by John?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following does Certification Authority (CA) provide in an e-commerce system?
Each correct answer represents a complete solution. Choose two.
Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?
Which of the following layers of the OSI model provides end-to-end service?
Which of the following protocols allows an e-mail client to access and manipulate a remote e-mail file without downloading it to the local computer?
Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?
Which of the following are the major tasks of risk management?
Each correct answer represents a complete solution. Choose two.
Which of the following types of evidence is considered as the best evidence?
Which of the following refers to a condition in which a computer repeatedly sends ICMP echo requests to another host?
Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?
Which of the following services is provided by the message authentication code (MAC) ?
A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to perform war dialing?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about buffer overflow are true?
Each correct answer represents a complete solution. Choose two.
Which of the following protocols work at the network layer?
Each correct answer represents a complete solution. Choose three.
Which of the following protocols uses TCP port 22 as the default port and operates at the application layer?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?
Which of the following statements about system hardening are true?
Each correct answer represents a complete solution. Choose two.
Which of the following are man-made threats that an organization faces?
Each correct answer represents a complete solution. Choose three.
John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?
Each correct answer represents a complete solution. Choose two.
Which of the following provides high availability of data?
Which of the following concepts represent the three fundamental principles of information security?
Each correct answer represents a complete solution. Choose three.
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?