Topic 1: Exam Pool A
Which of the following tools can be used to perform a zone transfer?
A.
NSLookup
B.
Finger
C.
Dig
D.
Sam Spade
E.
Host
F.
Netcat
G.
Neotrace
NSLookup
Dig
Sam Spade
Host
Which of the following program infects the system boot sector and the executable files at
the same time?
A.
Polymorphic virus
B.
Stealth virus
C.
Multipartite Virus
D.
Macro virus
Multipartite Virus
A bank stores and processes sensitive privacy information related to home loans. However,
auditing has never been enabled on the system. What is the first step that the bank should
take before enabling the audit feature?
A.
Perform a vulnerability scan of the system.
B.
Determine the impact of enabling the audit feature.
C.
Perform a cost/benefit analysis of the audit feature.
D.
Allocate funds for staffing of audit log review.
Determine the impact of enabling the audit feature.
Which results will be returned with the following Google search query? site:target.com –
site:Marketing.target.com accounting
A.
Results from matches on the site marketing.target.com that are in the domain
target.com but do not include the word accounting.
B.
Results matching all words in the query.
C.
Results for matches on target.com and Marketing.target.com that include the word
“accounting”
D.
Results matching “accounting” in domain target.com but not on the site
Marketing.target.com
Results matching “accounting” in domain target.com but not on the site
Marketing.target.com
A company’s policy requires employees to perform file transfers using protocols which
encrypt traffic. You suspect some employees are still performing file transfers using
unencrypted protocols because the employees do not like changes. You have positioned a
network sniffer to capture traffic from the laptops used by employees in the data ingest
department. Using Wireshark to examine the captured traffic, which command can be used
as display filter to find unencrypted file transfers?
A.
tcp.port = = 21
B.
tcp.port = 23
C.
tcp.port = = 21 | | tcp.port = =22
D.
tcp.port ! = 21
tcp.port = = 21
What is the minimum number of network connections in a multihomed firewall?
A.
3
B.
5
C.
4
D.
2
3
Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for endto-
end encryption of the connection?
A.
SFTP
B.
Ipsec
C.
SSL
D.
FTPS
Ipsec
Explanation: https://en.wikipedia.org/wiki/IPsec
Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and
encrypts the packets of data to provide secure encrypted communication between two
computers over an Internet Protocol network. It is used in virtual private networks (VPNs).
IPsec includes protocols for establishing mutual authentication between agents at the
beginning of a session and negotiation of cryptographic keys to use during the session.
IPsec can protect data flows between a pair of hosts (host-to-host), between a pair of
security gateways (network-to-network), or between a security gateway and a host
(network-to-host). IPsec uses cryptographic security services to protect communications
over Internet Protocol (IP) networks. It supports network-level peer authentication, dataorigin
authentication, data integrity, data confidentiality (encryption), and replay protection.
The initial IPv4 suite was developed with few security provisions. As a part of the IPv4
enhancement, IPsec is a layer 3 OSI model or internet layer end-to-end security scheme.
In contrast, while some other Internet security systems in widespread use operate above
layer 3, such as Transport Layer Security (TLS) that operates at the Transport Layer and
Secure Shell (SSH) that operates at the Application layer, IPsec can automatically secure
applications at the IP layer.
Which of the following is assured by the use of a hash?
A.
Authentication
B.
Confidentiality
C.
Availability
D.
Integrity
Integrity
Bob is doing a password assessment for one of his clients. Bob suspects that security
policies are not in place. He also suspects that weak passwords are probably the norm
throughout the company he is evaluating. Bob is familiar with password weaknesses and
key loggers.
Which of the following options best represents the means that Bob can adopt to retrieve
passwords from his clients hosts and servers?
A.
Hardware, Software, and Sniffing
B.
Hardware and Software Keyloggers
C.
Passwords are always best obtained using Hardware key loggers.
D.
Software only, they are the most effective
Hardware, Software, and Sniffing
Which is the first step followed by Vulnerability Scanners for scanning a network?
A.
OS Detection
B.
Firewall detection
C.
TCP/UDP Port scanning
D.
Checking if the remote host is alive
Checking if the remote host is alive
Explanation: Vulnerability scanning solutions perform vulnerability penetration tests on the
organizational network in three steps:
1. Locating nodes: The first step in vulnerability scanning is to locate live hosts in the target network using various scanning techniques.
2. Performing service and OS discovery on them: After detecting the live hosts in the
target network, the next step is to enumerate the open ports and services and the operating
system on the target systems.
3. Testing those services and OS for known vulnerabilities: Finally, after identifying the
open services and the operating system running on the target nodes, they are tested for
known vulnerabilities.
Page 7 out of 57 Pages |
Previous |