good luck on the exam
play

------------ GOOD LUCK ON THE EXAM ----------------- 1) In Buffer - PDF document

------------ GOOD LUCK ON THE EXAM ----------------- 1) In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code? A. EIP B. ESP C. EAP D. EEP Ans: A 2)Which type of scan does not


  1. ------------ GOOD LUCK ON THE EXAM ----------------- 1) In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code? A. EIP B. ESP C. EAP D. EEP Ans: A 2)Which type of scan does not open a full TCP connection? A. Stealth Scan B. XMAS Scan C. Null Scan D. FIN Scan Ans: A 3)How do you prevent a hacker from launching FIN, NULL, and X- MAS scans on your network? A. Modify the kernel to never send reset packets B. Block TCP/IP packets with FIN flag enabled at the firewall C. Enable IDS signatures to block these scans D. You cannot block a hacker from launching these scans on your network Ans: A 4) Which of the following encryption is not based on block cipher? A. DES B. Blowfish C. AES (Rijndael) D. RC4 Ans: D 5)TCP/IP Session Hijacking is carried out in which OSI layer? A. Transport layer

  2. B. Datalink layer C. Network Layer D. Physical Layer Ans: A 6)What defensive measures will you take to protect your network from password brute forcing attacks? (Select all that apply) A. Never leave a default password. B. Never use a password that can be found in a dictionary. C. Never use a password related to the hostname, domain name, or anything else that can be found with whois. D. Never use a password related to your hobbies, pets, relatives, or date of birth. E. Use a word that has more than 21 characters from a dictionary as the password Ans: A,B,C,D 8)What attacks can you successfully launch against a server using the SYN/ACK technique? A. Session Hijacking attacks B. Denial of Service attacks C. Web page defacement attacks D. IP spoofing attacks Ans: A 9)How do you penetrate high security systems such as banks? A. Try to hang around the local pubs or restaurants near the bank, get talking to a poorly-paid or disgruntled employee, and offer them money if they’ll abuse their access privileges by providing you with sensitive information. B. Look for “zero-day” exploits at various underground hacker websites in Russia and China and buy the necessary exploits from these hackers and target the bank’s network.

  3. C. Launch DDOS attacks against Merclyn Barley Bank’s routers and firewall systems using 100,000 or more “zombies” and “bots”. D. Try to conduct Man-in-the-Middle (MiTM) attack and divert the network traffic going to the Merclyn Barley Bank’s Webserver to that of your machine using DNS Cache Poisoning techniques Ans: A 11)You can always defend yourself by "ignorance of the law" clause. (True or False) Ans: False 12)You are configuring the security options of your mail server and you would like to block certain file attachments to prevent viruses and malware from entering the users inbox. Which of the following file formats will you block? (Select all that apply) A. .pif B. .scr C. .txt D. .com E. .exe F. .rar G. .vbs H. .hta I. .jpg Ans: A ,B,D,E,G,H 13)This tool floods the switch with bogus MAC addresses A. ./macof B ./sniffof C. ./dsniff D. ./switchsnarf

  4. Ans: A 14)Two types of BO A. Stack based buffer overflow B. Active buffer overflow C. Dynamic buffer overflow D. Heap based buffer overflow Ans: A ,D 16)Fingerprinting an Operating System helps a cracker because: (Select the Best Answer) A. It defines exactly what software you have installed B. It opens a security delayed C. window based on the port being scanned D. It informs the cracker of which vulnerabilities he may be able to exploit on your system E. It doesn't depend on the patches that have been applied to fix existing security holes Ans: D 17)What does the term ''Ethical Hacking'' mean? (Select the Best Answer) A. Someone who is hacking for ethics reasons B. Someone who is using their skills for ethics reasons C. Someone who is using their skills for defensive purposes D. Someone who is using their skills for offensive purposes Ans: C 18)Which of the following best describes Vulnerability? (Select the Best Answer) A. A weakness or error that can lead to a compromise B. An agent that could take advantage of a weakness C. An action or event that might prejudice security D. The loss potential of a threat Ans: A

  5. 20)What sequence of packets is sent during the initial TCP three way handshake? (Select the Best Answer) A. FIN, FINACK, B. ACK C. SYN, URG, ACK D. SYN, ACK, SYNACK E. SYN, SYNACK, Ans: E 21)An attacker has successfully compromised a remote computer. Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem? (Select the Best Answer) A. Install patches B. Setup a backdoor C. Cover your tracks D. Install a zombie for DDOS Ans: C 23)Within the context of Computer Security, which of the following statements describe Social Engineering best? (Select the Best Answer) A. Social Engineering is the act of publicly disclosing information B. Social Engineering is the act of getting needed information from a person rather than breaking into a system C. Social Engineering is the means put in place by human resource to perform time accounting

  6. D. Social Engineering is a training program within sociology studies Ans: B 24)Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate. How would you call this type of activity? (Select the Best Answer) A. CI Gathering B. Scanning C. Dumpster Diving D. Garbage Scooping Ans: C Ans: B 26) What is the essential difference between an 'Ethical Hacker' and a 'Cracker'? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Ans: C Section: (none) 27) What does the term "Ethical Hacking" mean? A. Someone who is hacking for ethical reasons. B. Someone who is using his/her skills for ethical reasons. C. Someone who is using his/her skills for defensive purposes. D. Someone who is using his/her skills for offensive purposes. Ans: C

  7. 29) You are foot printing an organization to gather competitive intelligence. You visit the company's website for contact information and telephone numbers but do not find it listed there. You know that they had the entire staff directory listed on their website 12 months ago but not it is not there. How would it be possible for you to retrieve information from the website that is outdated? A. Visit Google’s search engine and view the cached copy. B. Visit Archive.org web site to retrieve the Internet archive of the company's website. C. Crawl the entire website and store them into your computer. D. Visit the company's partners and customers website for this information. Ans: B Section: (none) 31) Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products? A. Covert keylogger B. Stealth keylogger C. Software keylogger D. Hardware keylogger Ans: D 32) A Buffer Overflow attack involves: A. Using a trojan program to direct data traffic to the target host's memory stack B. Flooding the target network buffers with data traffic to reduce the bandwidth available to legitimate users C. Using a dictionary to crack password buffers by guessing user names and passwords

  8. D. Poorly written software that allows an attacker to execute arbitrary code on a target system Ans: D 34) A majority of attacks come from insiders, people who have direct access to a company's computer system as part of their job function or a business relationship. Who is considered an insider? A. The CEO of the company because he has access to all of the computer systems B. A government agency since they know the company computer system strengths and weaknesses C. Disgruntled employee, customers, suppliers, vendors, business partners, contractors, temps, and consultants D. A competitor to the company because they can directly benefit from the publicity generated by making such an atta Ans: C 38) Currently we are using which IP PROTCOL A. IP4 B. IP6 C. IP3 D. IP5 Ans: A 39) For Asia which is the regional Internet registry A. ARIN B) RIPE C) LACNIC D) APNIC Ans D 40 Steganography works on- A. Audio files B. Video files C. Images D. All of the above Ans: D

  9. 41) Software tools that employ steganography to- A. Hides data inside of other files B. Replaces data inside files C. Hides data outside files D. None of the above Ans: A 42) The steganography process generally involves placing a hidden message in some transport medium, called- A. Medium B. Carrier C. Codes D. Semagrams Ans: A 43) What is malicious, surreptitious software that monitors your keystrokes, logging them to a file and keeps sending them off to remote attackers? A. Trojan B. Encoders C. Keylogger D. Virus Ans: C 44) Smtp address for gmail is A. smpt.gmail.com B. smtp.gmail.com C. smtp.google.com D. smtp.gmailcom Ans: B 45) Default port for smtp is A. 525 B. 587

  10. C. 465 D. 25 Ans: D 46) In 2 step verification of gmail the code is send on A. Mobile B. Recovery email id C. Alternate email id D. None of the above Ans: A 47) Facebook uses which method/medium to collect the user data A. Browser B. Cookie injection C. Adsense D. all of the above Ans: C 48) A static ip: A. remains constant throughout B. changes everytime a user logs in again C. both a & b D. can’t say Ans: A 50) 172.33.16.2 is a: A. Private ip B. Public ip C. Can’t say D. It is an invalid address Ans: B

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend