• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/100

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

100 Cards in this Set

  • Front
  • Back
Jack and John are investigation a computer breach that costs in the area of $75,000 in damages and needs to be handled on the same day the incident occurred. What incident level would this be classified as?

a) This incident would be classified as a high level incident.
b) This would be considered a low level incident.
c) This incident would be classified as an immediate level incident.
d) This situation would be classified as a mid-level incident.
d) This situation would be classified as a mid-level incident.
Which type of password cracking is similar to a dictionary attack but adds numbers and symbols to the words from the dictionary to try and crack the passwords?

a) Hybrid
b) Brute force
c) Syllable Attack
d) Rule Based Attack
a) Hybrid
Which command will cause an attacker to be able to gain a command shell on the victim if the command is run on the victim machine on port 56?

a) nc -p 56 -p -e cmd.exe
b) nc -L 56 -t -e cmd.exe
c) nc -port 56 -s cmd.exe
d) nc -r 56 -c cmd.exe
b) nc -L 56 -t -e cmd.exe
The tool Shown in the graphic is widely used for ARP Poisoning attacks. What is the name of the tool?

a) Beat Infector
b) Poison Ivy
c) Web Arp Infector
d) Cain and Able
The tool Shown in the graphic is widely used for ARP Poisoning attacks. What is the name of the tool?

a) Beat Infector
b) Poison Ivy
c) Web Arp Infector
d) Cain and Able
d) Cain and Able
Which of the following usually can't be performed using an email tracking software? (may also be called tracking probe)

a) Time spent on reading emails
b) Whether or not the recipient visited any links sent in the email
c) GPS Location of the email recipient
d) Remote control the users email client application and hijack traffic
e) When the email was received and read
f) Send destructive emails
g) Track PDF's and other types of attachments
d) Remote control the users email client application and hijack traffic
Which nslookup command would allow you to extract hinfo records from a dns server?

a) set dns=hinfo
b) configure type=hinfo
c) set record=hinfo
d) set type=hinfo
d) set type=hinfo
Which TCP flag instructs the sending system to send all buffered data immediately?

a) FIN
b) PSH
c) SYN
d) ACK
b) PSH
Which techniques are effective for evading IDS during a port scan? (select up to 4)

a) Use source routing when possible
b) Overload the IDS with junk traffic to mask your scan
c) Use fragmented IP packets
d) Connect to proxy servers or trojaned machines to launch scans
e) Spoof your ip address then sniff responses from the server being scanned
a) Use source routing when possible
c) Use fragmented IP packets
d) Connect to proxy servers or trojaned machines to launch scans
e) Spoof your ip address then sniff responses from the server being scanned
Which of the following is an example of Rogue Security Software?

a) Based on social engineering technique which lures a victim to bogus sites.
b) Software that disables security features like firewalls and AV
c) A fake AV program that claims to rid a computer of malware, but instead installs spyware or other malware on the computer.
c) A fake AV program that claims to rid a computer of malware, but instead installs spyware or other malware on the computer.
What can an attacker do with whois records? (select all that apply)

a) An attacker can attempt phishing and social engineering on targeted individuals using the information from whois records
b) Search engines like Google and Bing will expose information listed on the whois records
c) Spammers can send unsolicited emails to addresses listed in the whois record
d) IRS Agents will use this information in the whois records
a) An attacker can attempt phishing and social engineering on targeted individuals using the information from whois records
c) Spammers can send unsolicited emails to addresses listed in the whois record
Sniffing on a switched network is called ______________ sniffing

a) Grass
b) Passive
c) Sneaky
d) Active
d) Active
You cannot COMPLETELY block attackers doing password cracking attempts against web resources if they are constantly switching proxies.

a) True
b) False
a) True
Neil used a fake ID badge and uniform to follow other employees into a target organization. What technique did he use?

a) Piggybacking
b) Being smart
c) Lizard Licking attack
d) Tailgating
d) Tailgating
What is the length of an MD5 hash?

a) 48 bit
b) 128 bit
c) 68 bit
d) 32 bit
d) 32 bit
You have compromised a 2003 Server using a SMB exploit. Which command could you enter from the command line to disable auditing?

a) EnterPol /nolog
b) EventViewer -NoService
c) stoplog -d
d) auditpol.exe /disable
d) auditpol.exe /disable
What two things will happen if a router receives an ICMP packet, which has a TTL value of 1, and the destination host is several hops away? (select 2)

a) The router will decrement the value
b) The router will send a time exceeded message to the source host
c) The router will send an ICMP redirect message
d) The router will increment the value
e) The router will discard the packet
b) The router will send a time exceeded message to the source host
e) The router will discard the packet
What will the code in the graphic do?

a) It is a piece of Javascript that will place a specific image on every page of an RSS feed
b) Send a message to a server whenever the ESC key is pressed
c) Use a Webbug to send messages
d) Log all keystrokes
What will the code in the graphic do?

a) It is a piece of Javascript that will place a specific image on every page of an RSS feed
b) Send a message to a server whenever the ESC key is pressed
c) Use a Webbug to send messages
d) Log all keystrokes
d) Log all keystrokes
One way to verify the authenticity of emails is to do what?

a) Fake email uses extensive images. If there are a lot of images, it is probably fake
b) Verify the digital signature attached to the email. A fake email will not have a digital signature that matches the faked domain
c) Check the sender ID against the National Spam Database
d) Fake mail will have spelling and grammatical errors.
b) Verify the digital signature attached to the email. A fake email will not have a digital signature that matches the faked domain
Which type of sniffing technique is generally referred to as a MiTM attack?

a) MAC Flooding
b) ARP Spoofing
c) Password Sniffing
d) DHCP Sniffing
b) ARP Spoofing
What port does NTP use?

a) 125
b) 126
c) 123
d) 124
c) 123
It is a common technique to use Steganography to hide the true content of attachments sent out via email. One example of this is hiding an Excel file named infosec.xls inside a image file named photo1.jpg, then emailing it. Would you say this statement is true or false?

a) This is somewhat true but, not completely since you can only hide text in image files when using Steganography
b) This is true, period
c) This is not true
b) This is true, period
What type of password cracking table consists of pre-computed hashes?

a) Moon Tables
b) Rainbow Tables
c) Storm Tables
d) Sun Tables
b) Rainbow Tables
How would you keep Google from storing your search keywords? (so your search history doesn't show up when you start typing in the search bar in Google).

a) Block Google cookies by applying privacy and security settings in your browser
b) Use Mac OSX instead of Windows 7
c) Do not use Google, but use Bing! Because it doesn't store anything (nor does it find anything)
d) Disable Google cookies using Google's advanced search options
settings in your browser
What type of attack is shown in the graphic?

a) Cluster Service Attack
b) Distributed Denial of Service
c) Bandwitch Exhaust Attack
d) Denial of Service
What type of attack is shown in the graphic?

a) Cluster Service Attack
b) Distributed Denial of Service
c) Bandwitch Exhaust Attack
d) Denial of Service
b) Distributed Denial of Service
In what part of the OSI model does ARP poisoning occur?

a) Network Layer
b) Datalink Layer
c) Physical Layer
d) Application Layer
b) Datalink Layer
At what layer does TCP Session Hijacking occur?

a) Network Layer
b) Application Layer
c) Session Layer
d) Transport Layer
d) Transport Layer
Someone sent you a link that supposedly goes to cnn.com. The page looks like CNN but the URL says CNIN.com. How would you verify if the site is authentic or not?

a) Visit the site using SSL
b) Navigate to the site by visiting various blogs and forums for authentic links
c) Enable caching on your web browser and look for popup warnings
d) Visit the site by clicking on a link that you find when doing a google search for REAL domain
d) Visit the site by clicking on a link that you find when doing a google search for REAL domain
Which Trojan would be considered "Botnet Command and Control Center"?

a) Damen Rock
b) Matten Kit
c) YOUkill Doom
d) Poison Ivy
d) Poison Ivy
Which type of virus is shown in the graphic

a) Sparse Infector Virus
b) Metamorphic Virus
c) Boot Sector Virus
d) Cavity Virus
Which type of virus is shown in the graphic

a) Sparse Infector Virus
b) Metamorphic Virus
c) Boot Sector Virus
d) Cavity Virus
d) Cavity Virus
Your company only allows traffic over ports 80 and 443. You want to use an FTP server. How would you accomplish this with the current firewall rules.

a) Use the TOR network
b) Use a Reverse Proxy
c) Use Proxy chaining
d) Use HTTP Tunneling
d) Use HTTP Tunneling
How would you exploit TCP using a TCP SYN Attack?

a) Flood with TCP RST packets with random source addresses
b) Flood TCP SYN packets with random source addresses towards the victim
c) Flood with TCP ACK packets with random source addresses
b) Flood TCP SYN packets with random source addresses towards the victim
In the graphic, which packet represents the completion of the three-way handshake?

a) 6th Packet
b) 8th Packet
c) 5th Packet
d) 4th Packet
In the graphic, which packet represents the completion of the three-way handshake?

a) 6th Packet
b) 8th Packet
c) 5th Packet
d) 4th Packet
c) 5th Packet
Study the graphic scenario/process. In which stage would you engage a forensic investigator?

a) 5
b) 3
c) 4
d) 1
Study the graphic scenario/process. In which stage would you engage a forensic investigator?

a) 5
b) 3
c) 4
d) 1
c) 4
Study the snippet of virus code in the graphic. What type of virus do you think this is?

a) Metamorphic
b) Shuttle
c) Stealth
d) Polymorphic
Study the snippet of virus code in the graphic. What type of virus do you think this is?

a) Metamorphic
b) Shuttle
c) Stealth
d) Polymorphic
d) Polymorphic
Which statement is INCORRECT concerning vulnerability scanners?

a) They can validate compliance without deviations from organizational security policies
b) Vulnerability scanners can help identify missing patches, out of date software, and system upgrades
c) Vulnerability scanners can identify vulnerabilities and also fix and patch these vulnerabilities without intervention
d) Vulnerability scanners attempt to identify vulnerabilities in hosts being scanned
c) Vulnerability scanners can identify vulnerabilities and also fix and patch these vulnerabilities without intervention
Which of the following represent weak passwords? (select up to 2)

a) Passwords that contain only special characters
b) Passwords that contain special characters and numbers
c) Passwords that contain only letters. for example; QWERTY
d) Passwords that contain Uppercase/Lowercase from a dictionary list. For example; ApPle
c) Passwords that contain only letters. for example; QWERTY
d) Passwords that contain Uppercase/Lowercase from a dictionary list. For example; ApPle
Social Engineering is NOT part of the CEH Scanning lifecycle?

a) True
b) False
a) True
The easiest way to get users to install Trojans is have them download games, files and screensavers from internet sites?

a) True
b) False
a) True
Packets transmitted in either direction after the initial three-way handshake will have the PSH flag bit set.

a) True
b) False
b) False
In which stage of the Virus lifecycle does a stealth virus get activiated?

a) Elimination
b) Incorporation
c) Launch
d) Design
c) Launch
What is the default password hash algorithm used by NTLMv2?

a) MD4
b) DES
c) SHA
d) MD5
d) MD5
What port does Syslog Daemons listen on?

a) 312
b) 330
c) 120
d) 514
d) 514
What privilege does a rootkit usually require to successfully infect a user machine?

a) User Level priv
b) Kernel Level priv
c) Ring 3 priv
d) System Level priv
b) Kernel Level priv
Which of the following is the correct filter to look for people using facebook?

a) List.display.facebook
b) traffic.content==facebook
c) display==facebook
d) tcp contains facebook
d) tcp contains facebook
Which hping command would generate a packet that would appear to originate from 10.0.0.8?

a) hping3 -0 10.0.0.8 -S springvalley -c 2 -p 80
b) hping3 -T 10.0.0.8 -S springvalley -c 2 -p 80
c) hping3 -a 10.0.0.8 -S springvalley -c 2 -p 80
d) hping3 -Y 10.0.0.8 -S springvalley -c 2 -p 80
c) hping3 -a 10.0.0.8 -S springvalley -c 2 -p 80
Based on the SNORT IDS rule shown in the graphic, which hping command would you suspect generated the alert?

a) hping -S -R -P -A -F -U 192.168.2.56 -p 22 -c 5 -t 118 -y
b) hping -S -R -M -F -A -U 192.168.2.56 -p 22 -c 5 -t 118 -y
c) hping -S -P -F -
Based on the SNORT IDS rule shown in the graphic, which hping command would you suspect generated the alert?

a) hping -S -R -P -A -F -U 192.168.2.56 -p 22 -c 5 -t 118 -y
b) hping -S -R -M -F -A -U 192.168.2.56 -p 22 -c 5 -t 118 -y
c) hping -S -P -F -O -s -A 192.168.2.56 -p 22 -c 5 -t 118 -y
d) hping -S -A -SA -P -Q -F 192.168.2.56 -p 22 -c 5 -t 118 -y
a) hping -S -R -P -A -F -U 192.168.2.56 -p 22 -c 5 -t 118 -y
Which of the following statements defines an ICMP flood attack? (select all that apply)

a) Bogus ECHO reply packets are flooded on the network spoofing the IP and MAC address
b) The ICMP packets signal the victim system to reply and the combination of
Which of the following statements defines an ICMP flood attack? (select all that apply)

a) Bogus ECHO reply packets are flooded on the network spoofing the IP and MAC address
b) The ICMP packets signal the victim system to reply and the combination of traffic saturates the bandwith of the victim's network
c) A DDoS ICMP flood attack occurs when the zombies send large volumes of ICMP_ECHO_REPLY packets to the victim system
d) ECHO packets are flooded on the network saturating the bandwith of the subnet causing denial of service
c) A DDoS ICMP flood attack occurs when the zombies send large volumes of ICMP_ECHO_REPLY packets to the victim system
d) ECHO packets are flooded on the network saturating the bandwith of the subnet causing denial of service
Based on the graphic, what type of Trojan is shown?

a) E-Mail Trojan
b) Denial of Service Trojan
c) RAT Trojan
d) Destructing Trojan
e) Defacement Trojan
Based on the graphic, what type of Trojan is shown?

a) E-Mail Trojan
b) Denial of Service Trojan
c) RAT Trojan
d) Destructing Trojan
e) Defacement Trojan
e) Defacement Trojan
Trojan horse attacks pose one of the most serious types of threats to computer security. Based on the graphic, which is the easiest and most convincing way to infect a computer?

a) Legitimate "shrink-wrapped" software packaged by a disgruntled employee
Trojan horse attacks pose one of the most serious types of threats to computer security. Based on the graphic, which is the easiest and most convincing way to infect a computer?

a) Legitimate "shrink-wrapped" software packaged by a disgruntled employee
b) IRC (Internet Relay Chat)
c) Netbios File Sharing
d) Downloading files, games and screensavers from Internet sites.
d) Downloading files, games and screensavers from Internet sites.
Which of the following is not part of the CEH Scanning Methodology?

a) Scan for vulnerabilities
b) Checking for open ports
c) Social Engineering attacks
d) Draw network diagrams
e) Banner Grabbing
f) Check for live systems
g) Prepare proxies
c) Social Engineering attacks
TCP packets transmitted in either direction after the initial three-way handshake will have which of the following bits set?

a) ACK
b) XMAS Flag
c) FIN
d) SYN/ACK
a) ACK
In this type of Man-in-The-Middle (MiTM) attack, packets and authentication tokens are captured using a sniffer. Once the relevant information is extracted, the tokens are placed back on the network to gain access. (see the graphic).

a) Shoulder surfin
In this type of Man-in-The-Middle (MiTM) attack, packets and authentication tokens are captured using a sniffer. Once the relevant information is extracted, the tokens are placed back on the network to gain access. (see the graphic).

a) Shoulder surfing attack
b) Rainbow and hash generation attacks
c) Dumpster Diving attack
d) Token Injection Replay attacks
d) Token Injection Replay attacks
One defense against DDoS is Throttling. What is Throttling?

a) Providers can increase bandwith on critical connections to prevent them from going down in the event of an attack
b) Load balance each server in a multiple-server architecture
c) Replicating servers that can provide additional failsafe protection
d) Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to process
d) Set up routers that access a server with logic to adjust incoming traffic to levels that will be safe for the server to process
What type of session hijacking is shown in the graphic?

a) Token sniffing attack
b) Session Fixation attack
c) SQL Injection
d) Cross-site scripting attack
What type of session hijacking is shown in the graphic?

a) Token sniffing attack
b) Session Fixation attack
c) SQL Injection
d) Cross-site scripting attack
b) Session Fixation attack
Your computer has been infected by an email tracking and spying Trojan. This Trojan infects your computer with a single file emos.sys. Which step would you perform to detect this type of trojan? (see graphic for clarification)

a) Scan for suspicious st
Your computer has been infected by an email tracking and spying Trojan. This Trojan infects your computer with a single file emos.sys. Which step would you perform to detect this type of trojan? (see graphic for clarification)

a) Scan for suspicious startup programs using msconfig
b) Scan for suspicious network activities using Wireshark
c) Scan for suspicious open ports using netstat
d) Scan for suspicious drivers in c:\windows\system32\drivers
d) Scan for suspicious drivers in c:\windows\system32\drivers
This is an attack that takes advantage of a web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

a) Buffer Overflow attack
b) Cross-Site-Scripting attack
c) SQL Injection
d) URL Traversal attack
b) Cross-Site-Scripting attack
Based on the graphic, what are the next sequence and acknowledgement numbers that the router will send to the victim machine?

a) Sequence number: 82980070 Acknowledgement number: 17768885
b) Sequence number: 82980010 Acknowledgement number: 17768885
Based on the graphic, what are the next sequence and acknowledgement numbers that the router will send to the victim machine?

a) Sequence number: 82980070 Acknowledgement number: 17768885
b) Sequence number: 82980010 Acknowledgement number: 17768885
c) Sequence number: 17768729 Acknowledgement number: 82980070
d) Sequence number: 87000070 Acknowledgement number: 85320085
a) Sequence number: 82980070 Acknowledgement number: 17768885
How would you defend against ARP poisoning attacks? View the graphic for clarification on the attack. (select all that apply)

a) Enable Dynamic ARP Inspection
b) Enable DHCP Snooping Binding Table
c) Enable MAC snooping Table
d) Restrict ARP Duplica
How would you defend against ARP poisoning attacks? View the graphic for clarification on the attack. (select all that apply)

a) Enable Dynamic ARP Inspection
b) Enable DHCP Snooping Binding Table
c) Enable MAC snooping Table
d) Restrict ARP Duplicates
a) Enable Dynamic ARP Inspection
b) Enable DHCP Snooping Binding Table
A competitor could find job openings in your company, prepare someone to pass your interview, have you hire that person, and then they're inside your company. What's one way to prevent this?

a) Hire people through third party job agencies who will vet them for you
b) Investigate their social networking profiles
c) It is impossible to block these attacks
d) Have thorough background checks performed on job applicants before engaging or hiring them.
d) Have thorough background checks performed on job applicants before engaging or hiring them.
Study the SQL code in the graphic. How would you delete the OrdersTable using SQL Injection?

a) cmdshell'; 'del c:\sql\mydb\OrdersTable' //
b) Chicago'; drop table OrdersTable --
c) EXEC; SELECT * OrdersTable > DROP --
d) Delete table 'blah'; Orders
Study the SQL code in the graphic. How would you delete the OrdersTable using SQL Injection?

a) cmdshell'; 'del c:\sql\mydb\OrdersTable' //
b) Chicago'; drop table OrdersTable --
c) EXEC; SELECT * OrdersTable > DROP --
d) Delete table 'blah'; OrdersTable --
b) Chicago'; drop table OrdersTable --
This attack technique is used when the Web application is vulnerable to SQL Injection, but the results of the injection are not visible to the attacker.

a) Blind SQL Injection
b) Generic SQL Injection
c) Unique SQL Injection
d) Double SQL Injection
a) Blind SQL Injection
You want to perform advanced SQL Injection against a vulnerable website. You are unable to perform command shell hacks on this server. What must be enabled in SQL Server to launch these attacks?

a) EXEC master access
b) System services
c) xp_cmdshell
d) RDC
c) xp_cmdshell
What IV size is used in WPA2?

a) 24 bit
b) 128 bit
c) 48 bit
d) 32 bit
c) 48 bit
Annie Ann has performed a XSS attack against a site and succeeded in stealing a secure cookie. She is able to replay the cookie even while the session is valid on the server. Why is this possible?

a) Any cookie can be replayed irrespective of session status
b) It works because encryption in this case is performed at the application layer (single encryption key)
c) It works because encryption is performed at the network layer (layer 1 encryption)
d) This scenario is invalid as a secure cookie cannot be replayed
b) It works because encryption in this case is performed at the application layer (single encryption key)
What type of encryption does WPA2 use?

a) SHA 160 bit
b) DES 64 bit
c) AES-CCMP 128 bit
d) MD5 48 bit
c) AES-CCMP 128 bit
What type of virus is shown in the graphic?

a) Cavity virus
b) Metamorphic virus
c) Sparse Infector virus
d) Boot Sector virus
e) Macro virus
What type of virus is shown in the graphic?

a) Cavity virus
b) Metamorphic virus
c) Sparse Infector virus
d) Boot Sector virus
e) Macro virus
c) Sparse Infector virus
Jason is trying to analyze traffic using Wireshark. He has created the filter shown in the graphic. Based on the filter what is he trying to accomplish (capture).

a) RST, PSH/URG, FIN
b) ACK, ACK, SYN, URG
c) SYN, FIN, URG, and PSH
d) SYN, SYN/ACK,
Jason is trying to analyze traffic using Wireshark. He has created the filter shown in the graphic. Based on the filter what is he trying to accomplish (capture).

a) RST, PSH/URG, FIN
b) ACK, ACK, SYN, URG
c) SYN, FIN, URG, and PSH
d) SYN, SYN/ACK, ACK
d) SYN, SYN/ACK, ACK
Identify the correct statement related to the Web Server installation in the graphic.

a) Lack of proper security policy, procedures and maintenance
b) Misconfigured SSL certificates and encryption
c) Unpatched security flaws in the server software, O
Identify the correct statement related to the Web Server installation in the graphic.

a) Lack of proper security policy, procedures and maintenance
b) Misconfigured SSL certificates and encryption
c) Unpatched security flaws in the server software, OS and applications
d) Installing the server with default settings
e) Improper file and directory permissions
d) Installing the server with default settings
June is wondering if she can use anti-virus to protect herself from polymorphic viruses. Jake tells her that Anti-virus is not effective against polymorphic viruses because of how they change after each infection. Is Jake's statement true or false?

a) True
b) False
a) True
Which port when configured on a switch receives a copy of every packet that passes through it?

a) SPAN port
b) Monitor port
c) MIRROR port
d) R-DUPE port
a) SPAN port
If you wanted to change the password policy on your 2003 Active Directory Domain so that users could not change their passwords at regular frequency, what policies would you need to enable and enforce in Group Policy? (select two)

a) Adjust the "Enforce User Change at Next Logon" policy
b) Change the "Enforce Password History" setting in the Group Policy settings module
c) Adjust the "Maximum Password Age" policy
d) Enforce the "Minimum Password Age" setting
b) Change the "Enforce Password History" setting in the Group Policy settings module
d) Enforce the "Minimum Password Age" setting
What are some reasons you would use Anonymizer when browsing the web? (select all that apply)

a) Increase your web browsing bandwith speed using Anonymizer is speed blast mode
b) Post negative entries in blogs without revealing your IP identity
c) To bypass blocking applications that would prevent access to web sites or parts of sites that you want to visit
d) To protect your privacy and identity on the Internet
b) Post negative entries in blogs without revealing your IP identity
c) To bypass blocking applications that would prevent access to web sites or parts of sites that you want to visit
d) To protect your privacy and identity on the Internet
Based on the graphic, which file has the user browsed to on the target web server?

a) file.txt
b) robots.txt
c) blocklist.txt
d) spf.txt
Based on the graphic, which file has the user browsed to on the target web server?

a) file.txt
b) robots.txt
c) blocklist.txt
d) spf.txt
b) robots.txt
dDisgruntled employees are marked by several symtoms including leaving work early, calling in late or sick, being confrontational, extra time browsing the web, and always negative while finding fault with everything. They are also a big security risk. How would you deal with the disgruntled employee threat?

a) Organizations must ensure that their corporate data is centrally managed and delivered to users only when needed
b) Limit Internet access, email communications, access to social networking sites and job hunting portals
c) By implementing virtualization technology from the desktop to the data center, organizations can isolate different environments with varying levels of access and security to various employees
d) Limit access to the applications they can run on their desktop computers and enforce strict work hour rules
a) Organizations must ensure that their corporate data is centrally managed and delivered to users only when needed
c) By implementing virtualization technology from the desktop to the data center, organizations can isolate different environments with varying levels of access and security to various employees
Switches maintain a CAM table that maps individual MAC addresses on the network to physical ports on a switch. The graphic shows a MAC flooding attack. What happens when a CAM table becomes full?

a) Evey packet is dropped and the switch sends out SNMP
Switches maintain a CAM table that maps individual MAC addresses on the network to physical ports on a switch. The graphic shows a MAC flooding attack. What happens when a CAM table becomes full?

a) Evey packet is dropped and the switch sends out SNMP alerts to the IDS port
b) The CAM overflow table will cause the switch to crash causing a Denial of Service
c) the switch replaces outgoing frame switch factory default MAC address of FF:FF:FF:FF:FF:FF
d) The switch then acts as a hub by broadcasting packets to all machines on the network
d) The switch then acts as a hub by broadcasting packets to all machines on the network
The graphic shows a Microsoft tool that verifies signed vs unsigned critical files. This is one way to verify integrity of files. Which tools perform this action and shows the output in the graphic?

a) verifier.exe
b) signverif.exe
c) msverif.exe
d)
The graphic shows a Microsoft tool that verifies signed vs unsigned critical files. This is one way to verify integrity of files. Which tools perform this action and shows the output in the graphic?

a) verifier.exe
b) signverif.exe
c) msverif.exe
d) sigverif.exe
d) sigverif.exe
Which nmap command produced the output shown in the graphic? Assume you were trying to gain banner, server, and OS information.

a) nmap -F -sV -p 21,110,123 10.0.0.5
b) nmap -O -sV -p 21,110,123 10.0.0.5
c) nmap -T -sv -p 21,110,123 10.0.0.5
d) nmap
Which nmap command produced the output shown in the graphic? Assume you were trying to gain banner, server, and OS information.

a) nmap -F -sV -p 21,110,123 10.0.0.5
b) nmap -O -sV -p 21,110,123 10.0.0.5
c) nmap -T -sv -p 21,110,123 10.0.0.5
d) nmap -A -sV -p 21,110,123 10.0.0.5
b) nmap -O -sV -p 21,110,123 10.0.0.5
When viewing a SOA record, the zone Version is always the first value in the record?

a) True
b) False
a) True
What software can be used in War Driving to auto-map GPS coordinates to Access Points?

a) GPSmap
b) GPSdrive
c) Winpcap
d) Microsoft Mappoint
b) GPSdrive
You should prevent using which of the following C/C++ functions to help prevent buffer overflows? (select all that apply)

a) strcpy()
b) strsock()
c) strcat()
d) streadd()
a) strcpy()
c) strcat()
d) streadd()
Which tool can be used to recover a password protected Outlook archive?

a) Outlook Revealer
b) PstPassword
c) PwdRecover
d) Restore
b) PstPassword
What is sheepdig?

a) Process of checking physical media for virus before being used in a production computer
b) Used to coordinate honeypots
c) None of the above
d) Used to emulate a honeypot
a) Process of checking physical media for virus before being used in a production computer
What tool is used to disect html forms?

a) Whoop that trick
b) Rip
c) Looker
d) Form Scapal
d) Form Scapal
Which level in the packet signature mechanism in Netware forces the signing of all packets?

a) 2
b) 1
c) 0
d) 3
d) 3
Which is the default user account created for Oracle databases?

a) Admin
b) Root
c) OUTLN
d) Sysop
c) OUTLN
___________________ has the ability to crack smb passwords by simply listening to traffic.

a) John the Ripper
b) Snapple Cracker and Popper
c) L0phtcrack
d) Morpheus
c) L0phtcrack
Nmap and Queso can both be used for OS guessing.

a) True
b) False
a) True
What are the six types of social engineering?

a) Commitment
b) Friendship
c) Slickin it
d) Reciprocation
e) Social validation
f) Authority
g) Scarcity
a) Commitment
b) Friendship
d) Reciprocation
e) Social validation
f) Authority
g) Scarcity
Which exploit uses the functionality of DHTML in Internet Explorer and Microsoft Outlook?

a) Reaper Exploit
b) RPC Dcom
c) Corn Shell Exploit
d) None of the above
a) Reaper Exploit
What type of virus is shown here?

a) Cavity virus
b) Stealth virus
c) Polymorphic virus
d) Macro virus
What type of virus is shown here?

a) Cavity virus
b) Stealth virus
c) Polymorphic virus
d) Macro virus
a) Cavity virus
What would you use to disable file extensions in Apache?

a) Lib_changes
b) Stop_files
c) mod_negotiation
d) Disable_ext
c) mod_negotiation
What can you enable on a switch to protect against DHCP starvation?

a) DHCP filters
b) DHCP-BLOCK 1
c) ARP-Block
d) DHCP snooping
d) DHCP snooping
Which specially configured port on a switch can receive every packet that passes through the switch?

a) Copy Cat port
b) R_DUPE port
c) SPAN port
d) Monitor port
c) SPAN port
Which technique is used to prevent SPAM? The technique consists of slowing down responses to outside SMTP servers?

a) Spam Blocking
b) Teergrubbing
c) Chaining
d) Sender Policy Framework
b) Teergrubbing
You can examine the SOA record on a DNS server to see how long a dns cache poisoning attack would last. Essentially the TTL value.

a) This is completely true
b) This is incorrect
c) SOA has nothing to do with DNS
d) This is partially true
a) This is completely true
Which type of virus appears to be something else?

a) Polymorphic virus
b) Rootkit
c) Melissa Type virus
d) Camouflage virus
d) Camouflage virus
Concerning Netware, there is no such thing as a status of being logged in as Administrator.

a) True
b) False
a) True
The process of distributing incorrect IP addresses/names with the intent of diverting traffic is called what?

a) DNS poisoning
b) Scanning
c) Aliasing
d) Arping
a) DNS poisoning
Billy Joe scans his network using an XMAS scan. None of the ports scanned respond back with anythnig. What can you infer from this?

a) The ports are in stealth mode
b) The ports are in state of shock
c) All ports must be open because there's no response to a XMAS scan when ports are open
d) If a port does not respond to an XMAS scan, the port is closed
c) All ports must be open because there's no response to a XMAS scan when ports are open
Study the graphic. What is this ASP code vulnerable to?

a) Traversal
b) Cross Site Scripting
c) SQL Injection
d) Parameter Injection
Study the graphic. What is this ASP code vulnerable to?

a) Traversal
b) Cross Site Scripting
c) SQL Injection
d) Parameter Injection
b) Cross Site Scripting