1.
You are footprinting an organization and gathering competitive intelligence. You visit the company's website for contact information and telephone numbers but do not find them listed there. You know they had the entire staff
directory listed on their website 12 months ago but now it is not there. Is there any way you can retrieve information from a website that is outdated?
Correct Answer
C. Visit Archive.org web site to retrieve the Internet archive of the company's website
Explanation
The Archive.org website is known for its Wayback Machine feature, which allows users to view archived versions of websites from the past. By visiting the Archive.org website, you can access the Internet archive of the company's website and retrieve the information that was previously listed, including the staff directory and contact information. This can be a useful method to retrieve outdated information from a website that no longer has it listed.
2.
You are the CIO for Avantes Finance International, a global finance company based in Geneva. You are responsible for network functions and logical security throughout the entire corporation. Your company has over 250 servers running Windows Server, 5000 workstations running Windows Vista, and 200 mobile users working from laptops on Windows 7.
Last week, 10 of your company's laptops were stolen from salesmen while at a conference in Amsterdam. These laptops contained proprietary company information. While doing damage assessment on the possible public relations nightmare this may become, a news story leaks about the stolen laptops and also that sensitive information from those computers was posted to a blog online.
What built-in Windows feature could you have implemented to protect the sensitive information on these laptops?
Correct Answer
D. You could have implemented Encrypted File System (EFS) to encrypt the sensitive files on the laptops
Explanation
The correct answer suggests that implementing Encrypted File System (EFS) could have protected the sensitive information on the stolen laptops. EFS is a built-in Windows feature that allows users to encrypt individual files and folders, providing an additional layer of security. By encrypting the sensitive files on the laptops, even if the laptops are stolen, the information would remain encrypted and inaccessible to unauthorized users. This would help prevent the leakage of sensitive information in case of theft or unauthorized access to the laptops.
3.
A Trojan horse is a destructive program that masquerades as a benign application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but in addition to the expected function steals information or harms the system.
The challenge for an attacker is to send a convincing file attachment to the victim, which gets easily executed on the victim machine without raising any suspicion. Today's end users are quite knowledgeable about malwares and viruses. Instead of sending games and fun executables, Hackers today are quite successful in spreading the Trojans using Rogue security software. What is Rogue security software?
Correct Answer
C. Rogue security software is basedon social engineering technique in which the attackers lures victim to visit spear pHishing websites
4.
Which of the following is NOT part of CEH Scanning Methodology?
Correct Answer
E. Social Engineering attacks
Explanation
Social Engineering attacks are not part of CEH Scanning Methodology. CEH Scanning Methodology involves checking for live systems, checking for open ports, banner grabbing, preparing proxies, scanning for vulnerabilities, and drawing network diagrams. Social Engineering attacks, on the other hand, involve manipulating individuals to gain unauthorized access to systems or information, which is not directly related to scanning networks for vulnerabilities.
5.
Lee is using Wireshark to log traffic on his network. He notices a number of packets being directed to an
internal IP from an outside IP where the packets are ICMP and their size is around 65,536 bytes. What is Lee
seeing here?
Correct Answer
C. Lee is seeing a Ping of death attack.
Explanation
Lee is seeing a Ping of death attack. This is indicated by the large size of the ICMP packets, which are around 65,536 bytes. A Ping of death attack involves sending oversized ICMP packets to a target's IP address, causing the target system to crash or become unresponsive.
6.
This method is used to determine the Operating system and version running on a remote target system. What
is it called?
Correct Answer
B. OS Fingerprinting
Explanation
OS fingerprinting is a method used to determine the operating system and version running on a remote target system. This technique involves analyzing network packets or responses from the target system to identify specific characteristics or behaviors that are unique to different operating systems. By analyzing these fingerprints, security professionals can gain valuable information about the target system, which can be used for vulnerability assessment or penetration testing purposes.
7.
William has received a Chess game from someone in his computer programming class through email. William does not really know the person who sent the game very well, but decides to install the game anyway because he really likes Chess.
After William installs the game, he plays it for a couple of hours. The next day, William plays the Chess game again and notices that his machine has begun to slow down. He brings up his Task Manager and sees the following programs running:
Correct Answer
B. Remote Access Trojan (RAT)
Explanation
The correct answer is Remote Access Trojan (RAT). A RAT is a type of malware that allows an attacker to remotely control a victim's computer. In this scenario, William's computer has been infected with a RAT after installing the Chess game. This explains why his machine has started to slow down and why he sees the RAT program running in his Task Manager. The RAT is likely responsible for the decrease in performance and may also be compromising William's privacy and security by allowing the attacker to access and control his computer remotely.
8.
John the hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct MiTM attack. What is the destination MAC address of a broadcast frame?
Correct Answer
A. 0xFFFFFFFFFFFF
Explanation
The destination MAC address of a broadcast frame is 0xFFFFFFFFFFFF. In Ethernet, a broadcast frame is sent to all devices on the network, so the destination MAC address is set to the broadcast address, which is represented by all Fs in hexadecimal notation.
9.
You are gathering competitive intelligence on an organization. You notice that they have jobs listed on a few Internet job-hunting sites. There are two jobs for network and system administrators. How can this help you in foot printing the organization?
Correct Answer
D. To learn about the operating systems, services and applications used on the network
Explanation
By observing the job listings for network and system administrators, one can infer the specific operating systems, services, and applications that are being used by the organization. This information can be valuable for foot printing the organization as it provides insight into the technology infrastructure and potential vulnerabilities that may exist.
10.
TCP packets transmitted in either direction after the initial three-way handshake will have which of the following bit set?
Correct Answer
B. ACK flag
Explanation
After the initial three-way handshake in TCP, the ACK flag is set in the packets transmitted in either direction. The ACK flag is used to acknowledge the receipt of data and to confirm that the previous segment was received successfully. It is important for ensuring reliable data transmission and flow control in TCP.
11.
The programmers on your team are analyzing the free, open source software being used to run FTP services on a server in your organization. They notice that there is excessive number of functions in the source code that might lead to buffer overflow. These C++ functions do not check bounds. Identify the line in the source code that might lead to buffer overflow?
Correct Answer
B. 17
Explanation
Line 17 in the source code might lead to buffer overflow because the C++ functions at that line do not check bounds, which means that they do not verify if the data being written to the buffer exceeds its allocated size. This can result in writing data beyond the buffer's boundaries, causing a buffer overflow vulnerability.
12.
What framework architecture is shown in this exhibit?
Correct Answer
B. Metaspolit
Explanation
The correct answer is Metasploit. Metasploit is a framework that provides information about security vulnerabilities and aids in penetration testing. It allows users to exploit vulnerabilities in systems and gain unauthorized access. The exhibit likely shows the architecture of the Metasploit framework, which includes various components and modules used for scanning, exploiting, and post-exploitation activities.
13.
Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces?
Correct Answer
B. Snow
Explanation
Snow is a steganography utility that exploits the nature of white space and allows the user to conceal information in these white spaces.
14.
You have chosen a 22 character word from the dictionary as your password. How long will it take to crack the password by an attacker?
Correct Answer
B. 5 minutes
Explanation
The given answer suggests that it will take an attacker only 5 minutes to crack a 22 character word password. This implies that the password is not strong enough and can be easily guessed or hacked using various methods such as brute force attacks or dictionary attacks. A strong password should ideally be longer and include a combination of uppercase and lowercase letters, numbers, and special characters to make it more secure and difficult to crack.
15.
While testing web applications, you attempt to insert the following test script into the search area on the company's web site:
<script>alert('Testing Testing Testing')</script>
Later, when you press the search button, a pop up box appears on your screen with the text "Testing Testing Testing". What vulnerability is detected in the web application here?
Correct Answer
A. Cross Site Scripting
Explanation
The vulnerability detected in the web application in this scenario is Cross Site Scripting (XSS). This is evident from the fact that when the test script is inserted into the search area and the search button is pressed, a pop-up box appears on the screen with the text "Testing Testing Testing". This indicates that the web application is not properly sanitizing or validating user input, allowing the execution of malicious scripts.
16.
What techniques would you use to evade IDS during a Port Scan? (Select 4 answers)
Correct Answer(s)
A. Use fragmented IP packets
B. Spoof your IP address when launching attacks and sniff responses from the server
D. Use source routing (if possible)
E. Connect to proxy servers or compromised Trojaned machines to launch attacks
Explanation
To evade IDS during a Port Scan, one can use the following techniques:
- Using fragmented IP packets: By splitting the packets, it becomes difficult for the IDS to detect the malicious activity.
- Spoofing IP address and sniffing responses: By disguising the source IP address, it becomes challenging for the IDS to track the attacker. Sniffing responses allows the attacker to gather information without being detected.
- Overloading IDS with junk traffic: By flooding the IDS with irrelevant traffic, the actual scan can be masked.
- Using source routing: If available, source routing can be used to bypass the IDS and hide the true source of the attack.
- Connecting to proxy servers or compromised machines: By using these intermediaries, the attacker can launch the scan without being directly traced.
17.
Bob was frustrated with his competitor, Brownies Inc., and decided to launch an attack that would result in serious financial losses. He planned the attack carefully and carried out the attack at the appropriate moment.
Meanwhile, Trent, an administrator at Brownies Inc., realized that their main financial transaction server had been attacked. As a result of the attack, the server crashed and Trent needed to reboot the system, as no one was able to access the resources of the company. This process involves human interaction to fix it.
What kind of Denial of Service attack was best illustrated in the scenario above?
Correct Answer
C. DoS attacks which involves crashing a network or system
Explanation
The scenario described in the question involves Bob launching an attack that results in serious financial losses for Brownies Inc. The attack causes their main financial transaction server to crash, requiring human interaction to fix it and rendering the company's resources inaccessible. This aligns with the definition of a Denial of Service (DoS) attack, specifically one that involves crashing a network or system.
18.
Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense's front end Exchange Server. He was able to get into the server, located in a DMZ, by using an unused service account that had a very weak password that he was able to guess. Johnny wants to crack the administrator password, but does not have a lot of time to crack it. He wants to use a tool that already has the LM hashes computed for all possible permutations of the administrator password.
What tool would be best used to accomplish this?
Correct Answer
D. RainbowTables
Explanation
RainbowTables would be the best tool to accomplish this task because it already has the precomputed LM hashes for all possible permutations of the administrator password. This means that Johnny can quickly compare the LM hash of the target password with the precomputed hashes in the RainbowTables to find a match, significantly reducing the time required to crack the password.
19.
In this type of Man-in-the-Middle attack, packets and authentication tokens are captured using a sniffer. Once the relevant information is extracted, the tokens are placed back on the network to gain access.
Correct Answer
A. Token Injection Replay attacks
Explanation
In a Token Injection Replay attack, the attacker captures packets and authentication tokens using a sniffer. They then extract the relevant information and place the tokens back on the network to gain access. This allows the attacker to impersonate a legitimate user and bypass authentication measures.
20.
The FIN flag is set and sent from host A to host B when host A has no more data to transmit (Closing a TCP connection). This flag releases the connection resources. However, host A can continue to receive data as long as the SYN sequence numbers of transmitted packets from host B are lower than the packet segment containing the set FIN flag.
Correct Answer
B. True
Explanation
The explanation for the given correct answer is that the FIN flag is indeed set and sent from host A to host B when host A has no more data to transmit and wants to close the TCP connection. This flag is used to release the connection resources. However, even after sending the FIN flag, host A can still receive data as long as the SYN sequence numbers of the transmitted packets from host B are lower than the packet segment containing the set FIN flag. Therefore, the statement is true.
21.
Jason is the network administrator of Spears Technology. He has enabled SNORT IDS to detect attacks going through his network. He receives Snort SMS alerts on his iPhone whenever there is an attempted intrusion to his network.
He receives the following SMS message during the weekend.
An attacker Chew Siew sitting in Beijing, China had just launched a remote scan on Jason's network with the hping command.
Which of the following hping2 command is responsible for the above snort alert?
Correct Answer
A. Chenrocks:/home/siew # hping -S -R -P -A -F -U 192.168.2.56 -p 22 -c 5 -t 118
Explanation
The hping2 command responsible for the above snort alert is "hping -S -R -P -A -F -U 192.168.2.56 -p 22 -c 5 -t 118". This command includes various flags that indicate different types of TCP/IP packets being sent to the target IP address and port. The flags -S, -R, -P, -A, -F, and -U represent SYN, RST, PUSH, ACK, FIN, and UDP packets respectively. The fact that these flags are included in the command indicates that the attacker is attempting to perform a remote scan on Jason's network.
22.
Leesa is the senior security analyst for a publicly traded company. The IT department recently rolled out an intranet for company use only with information ranging from training, to holiday schedules, to human resources data. Leesa wants to make sure the site is not accessible from outside and she also wants to ensure the site is Sarbanes-Oxley (SOX) compliant. Leesa goes to a public library as she wants to do some Google searching to verify whether the company's intranet is accessible from outside and has been indexed by Google. Leesa wants to search for a website title of "intranet" with part of the URL containing the word "intranet" and the words "human resources" somewhere in the webpage.
What Google search will accomplish this?
Correct Answer
C. Intitle:intranet inurl:intranet+intext:"human resources"
Explanation
The correct answer, "intitle:intranet inurl:intranet+intext:"human resources"", will accomplish the desired Google search. This search uses the "intitle" operator to search for webpages with "intranet" in the title, the "inurl" operator to search for webpages with "intranet" in the URL, and the "intext" operator to search for webpages with "human resources" in the page content. This combination of operators will help Leesa find webpages that contain the desired keywords and meet her requirements for the company's intranet.
23.
Bob has been hired to do a web application security test. Bob notices that the site is dynamic and must make use of a back end database. Bob wants to see if SQL Injection would be possible. What is the first character that Bob should use to attempt breaking valid SQL request?
Correct Answer
C. Single Quote
Explanation
Bob should use the single quote character to attempt breaking a valid SQL request because it is commonly used in SQL injection attacks to manipulate the structure of the SQL query and potentially gain unauthorized access to the database. By injecting a single quote, Bob can test if the application is vulnerable to SQL injection by observing any error messages or unexpected behavior from the application.
24.
Hampton is the senior security analyst for the city of Columbus in Ohio. His primary responsibility is to ensure that all physical and logical aspects of the city's computer network are secure from all angles. Bill is an IT technician that works with Hampton in the same IT department. Bill's primary responsibility is to keep PC's and servers up to date and to keep track of all the agency laptops that the company owns and lends out to its employees. After Bill setup a wireless network for the agency, Hampton made sure that everything was secure. He instituted encryption, rotating keys, turned off SSID broadcasting, and enabled MAC filtering. According to agency policy, only company laptops are allowed to use the wireless network, so Hampton entered all the MAC addresses for those laptops into the wireless security utility so that only those laptops should be able to access the wireless network. Hampton does not keep track of all the laptops, but he is pretty certain that the agency only purchases Dell laptops. Hampton is curious about this because he notices Bill working on a Toshiba laptop one day and saw that he was on the Internet. Instead of jumping to conclusions, Hampton decides to talk to Bill's boss and see if they had purchased a Toshiba laptop instead of the usual Dell. Bill's boss said no, so now Hampton is very curious to see how Bill is accessing the Internet. Hampton does site surveys every couple of days, and has yet to see any outside wireless network signals inside the company's building.
How was Bill able to get Internet access without using an agency laptop?
Correct Answer
A. Bill spoofed the MAC address of Dell laptop
Explanation
Bill was able to get Internet access without using an agency laptop because he spoofed the MAC address of a Dell laptop. This means that he changed the MAC address of his Toshiba laptop to match the MAC address of a Dell laptop that was allowed to access the wireless network. By doing this, Bill was able to bypass the MAC address filtering implemented by Hampton and gain unauthorized access to the network.
25.
LAN Manager Passwords are concatenated to 14 bytes, and split in half. The two halves are hashed individually. If the password is 7 characters or less, than the second half of the hash is always:
Correct Answer
A. 0xAAD3B435B51404EE
Explanation
The given answer, 0xAAD3B435B51404EE, is the second half of the hash when the password is 7 characters or less. This suggests that the password provided is 7 characters or less, and the second half of the hash is always the same for such passwords. The first half of the hash is not provided, but it can be assumed that it would be different for each password.
26.
When writing shellcodes, you must avoid ____________ because these will end the string.
Correct Answer
B. Null bytes
Explanation
When writing shellcodes, null bytes must be avoided because they act as string terminators. This means that any characters or instructions after a null byte will not be processed or executed. Therefore, including null bytes in a shellcode can cause it to be truncated or rendered ineffective.
27.
Jess the hacker runs L0phtCrack's built-in sniffer utility that grabs SMB password hashes and stores them for offline cracking. Once cracked, these passwords can provide easy access to whatever network resources the user account has access to. But Jess is not picking up hashes from the network. Why?
Correct Answer
A. The network protocol is configured to use SMB Signing
Explanation
When SMB signing is enabled, it adds a digital signature to the SMB packets, ensuring the integrity and authenticity of the data being transmitted. This prevents unauthorized access or tampering with the data, including password hashes. Therefore, Jess is not able to pick up the hashes from the network because they are protected by SMB signing.
28.
Harold works for Jacobson Unlimited in the IT department as the security manager. Harold has created a security policy requiring all employees to use complex 14 character passwords. Unfortunately, the members of management do not want to have to use such long complicated passwords so they tell Harold's boss this new password policy should not apply to them. To comply with the management's wishes, the IT department creates another Windows domain and moves all the management users to that domain. This new domain has a password policy only requiring 8 characters.
Harold is concerned about having to accommodate the managers, but cannot do anything about it. Harold is also concerned about using LanManager security on his network instead of NTLM or NTLMv2, but the many legacy applications on the network prevent using the more secure NTLM and NTLMv2. Harold pulls the SAM files from the DC's on the original domain and the new domain using Pwdump6.
Harold uses the password cracking software John the Ripper to crack users' passwords to make sure they are strong enough. Harold expects that the users' passwords in the original domain will take much longer to crack than the management's passwords in the new domain. After running the software, Harold discovers that the 14 character passwords only took a short time longer to crack than the 8 character passwords.
Why did the 14 character passwords not take much longer to crack than the 8 character passwords?
Correct Answer
D. LanManger hashes are broken up into two 7 character fields
Explanation
The reason why the 14 character passwords did not take much longer to crack than the 8 character passwords is because LanManager hashes, which are used in the original domain, are broken up into two 7 character fields. This means that even though the passwords are longer, they are still split into two parts, making it easier for password cracking software like John the Ripper to crack them. Therefore, the length of the password does not significantly increase the time it takes to crack it in this case.
29.
You establish a new Web browser connection to Google. Since a 3-way handshake is required for any TCP
connection, the following actions will take place.
- DNS query is sent to the DNS server to resolve www.google.com
- DNS server replies with the IP address for Google?
- SYN packet is sentto Google.
- Google sends back a SYN/ACK packet
- Your computer completes the handshake by sending an ACK
- The connection is established and the transfer of data commences
Which of the following packets represent completion of the 3-way handshake?
Correct Answer
D. 5th packet
Explanation
The 5th packet represents the completion of the 3-way handshake. This is because the 3rd packet is the SYN packet sent by the client, the 4th packet is the SYN/ACK packet sent by the server, and the 5th packet is the ACK packet sent by the client to acknowledge the SYN/ACK packet. The ACK packet completes the handshake and establishes the connection.
30.
E-mail tracking is a method to monitor and spy the delivered e-mails to the intended recipient.
Select a feature, which you will NOT be able to accomplish with this probe?
Correct Answer
H. Remote control the User's E-mail client application and hijack the traffic
Explanation
E-mail tracking allows monitoring and spying on delivered e-mails, but it does not provide the capability to remotely control the user's e-mail client application and hijack the traffic. This feature goes beyond the scope of e-mail tracking and involves unauthorized access and control of the recipient's device.
31.
Which of the following Trojans would be considered 'Botnet Command Control Center'?
Correct Answer
C. Poison Ivy
Explanation
Poison Ivy is considered a 'Botnet Command Control Center' because it is a remote administration tool (RAT) that allows an attacker to control compromised computers remotely. It provides full control over the infected machines, allowing the attacker to execute commands, steal information, and monitor activities. This makes Poison Ivy a powerful tool for managing a botnet, which is a network of compromised computers controlled by a central command center.
32.
What type of Virus is shown here?
Correct Answer
B. Cavity Virus
Explanation
A cavity virus is a type of virus that infects executable files by inserting its code into empty spaces within the file. This allows the virus to hide and avoid detection. In this case, the given answer suggests that the virus shown is a cavity virus, indicating that it infects files by occupying empty spaces within them.
33.
John is using a special tool on his Linux platform that has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI/ASPX scripts. Moreover, the database detects DDoS zombies and Trojans as well. What would be the name of this tool?
Correct Answer
B. Nessus
Explanation
Nessus is the correct answer because it is a popular and widely used vulnerability scanning tool for Linux platforms. It has a comprehensive database of signatures that can detect various vulnerabilities in UNIX, Windows, and commonly used web CGI/ASPX scripts. Additionally, Nessus is capable of detecting DDoS zombies and Trojans, making it a versatile tool for security professionals.
34.
Fred is scanning his network to ensure it is as secure as possible. Fred sends a TCP probe packet to a host with a FIN flag and he receives a RST/ACK response. What does this mean?
Correct Answer
D. This means that the port he is scanning on the host is closed.
Explanation
The RST/ACK response indicates that the port Fred is scanning on the host is closed. When Fred sends a TCP probe packet with a FIN flag, he expects to receive a response indicating whether the port is open or closed. In this case, the RST/ACK response indicates that the port is closed and not accepting any incoming connections. This suggests that the network is secure because the closed port is not vulnerable to unauthorized access or attacks.
35.
_____________ is a type of symmetric-key encryption algorithm that transforms a fixed-length block of plaintext (unencrypted text) data into a block of ciphertext (encrypted text) data of the same length.
Correct Answer
B. Block CipHer
Explanation
A block cipher is a type of symmetric-key encryption algorithm that operates on fixed-length blocks of plaintext data. It transforms each block of plaintext into a block of ciphertext of the same length using a specific encryption algorithm and a secret key. Unlike stream ciphers that encrypt data bit by bit or byte by byte, block ciphers encrypt data in fixed-sized blocks, providing a higher level of security. The ciphertext produced by a block cipher is also of the same length as the plaintext, making it suitable for applications that require fixed-length data encryption.
36.
Your company has blocked all the ports via external firewall and only allows port 80/443 to connect to the Internet. You want to use FTP to connect to some remote server on the Internet.
How would you accomplish this?
Correct Answer
A. Use HTTP Tunneling
Explanation
HTTP Tunneling allows you to encapsulate FTP traffic within HTTP requests, which are allowed through the firewall via port 80/443. This enables you to bypass the port restrictions and establish an FTP connection to the remote server.
37.
You have successfully gained access to a victim's computer using Windows 2003 Server SMB Vulnerability.
Which command will you run to disable auditing from the cmd?
Correct Answer
D. Auditpol.exe /disable
Explanation
To disable auditing from the command prompt after gaining access to a victim's computer using the Windows 2003 Server SMB Vulnerability, the command that should be run is "auditpol.exe /disable". This command will disable auditing on the system, preventing any further logging or tracking of activities.
38.
How do you defend against MAC attacks on a switch?
Correct Answer
D. Enable Port Security on the switch
Explanation
Enabling port security on a switch is an effective way to defend against MAC attacks. Port security allows the switch to restrict the number of MAC addresses that can be learned on a specific port. This prevents attackers from flooding the switch with fake MAC addresses or attempting to overload the switch's MAC address table. By limiting the number of MAC addresses, port security ensures that only trusted devices are allowed to connect to the network, thereby protecting against unauthorized access and MAC attacks.
39.
In which location, SAM hash passwords are stored in Windows 7?
Correct Answer
A. C:\windows\system32\config\SAM
Explanation
SAM hash passwords in Windows 7 are stored in the c:\windows\system32\config\SAM location.
40.
File extensions provide information regarding the underlying server technology. Attackers can use this information to search vulnerabilities and launch attacks. How would you disable file extensions in Apache servers?
Correct Answer
B. Use mod_negotiation
Explanation
To disable file extensions in Apache servers, you would use mod_negotiation. This module allows you to control the content negotiation process, which includes handling file extensions. By disabling file extensions, you can prevent attackers from gathering information about the server technology and reduce the risk of vulnerability searches and attacks.
41.
Bob has a good understanding of cryptography, having worked with it for many years. Cryptography is used to secure data from specific threats, but it does not secure the application from coding errors. It can provide data privacy; integrity and enable strong authentication but it cannot mitigate programming errors. What is a good example of a programming error that Bob can use to explain to the management how encryption will not address all their security concerns?
Correct Answer
A. Bob can explain that using a weak key management technique is a form of programming error
Explanation
Using a weak key management technique is a form of programming error because it can compromise the security of the encryption. Even if encryption is implemented correctly, if the keys used for encryption are weak or easily guessable, it can be exploited by attackers. Weak key management techniques include using short or common passwords, not regularly changing encryption keys, or storing keys insecurely. These practices can undermine the effectiveness of encryption and leave the data vulnerable to unauthorized access. Therefore, Bob can explain to the management that encryption alone cannot address all security concerns if weak key management techniques are used.
42.
Finding tools to run dictionary and brute forcing attacks against FTP and Web servers is an easy task for hackers. They use tools such as arhontus or brutus to break into remote servers.
A command such as this, will attack a given 10.0.0.34 FTP and Telnet servers simultaneously with a list of passwords and a single login name: linksys. Many FTP-specific password-guessing tools are also available from major security sites.
What defensive measures will you take to protect your network from these attacks?
Correct Answer(s)
A. Never leave a default password
B. Never use a password that can be found in a dictionary
C. Never use a password related to your hobbies, pets, relatives, or date of birth.
E. Never use a password related to the hostname, domain name, or anything else that can be found with whois
Explanation
The correct answer is a combination of several defensive measures to protect the network from dictionary and brute force attacks. By never leaving a default password, the network eliminates the risk of hackers easily guessing the password. Additionally, by avoiding passwords that can be found in a dictionary and ones related to personal information such as hobbies, pets, relatives, or date of birth, the network increases the complexity of the password, making it harder to crack. Furthermore, using a password that is not related to the hostname, domain name, or any other information that can be found with whois adds another layer of security. By implementing these measures, the network reduces the vulnerability to dictionary and brute force attacks.
43.
One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p and q are discovered through a _____________ process, then the private key can be derived.
Correct Answer
A. Factorization
Explanation
Factorization is the process of finding the prime factors of a number. In the context of RSA encryption, if an attacker is able to factorize the modulus (which is the product of the two prime numbers p and q), they can easily calculate the private key. This is because the private key is derived from the prime factors of the modulus. Therefore, factorization is the most common and effective way to crack RSA encryption.
44.
Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Servers.
Correct Answer
A. True
Explanation
When Basic Authentication is configured on web servers, data is sent over the network as clear text, meaning it is not encrypted. This means that anyone who intercepts the data can easily read and understand its contents. This lack of encryption can pose a security risk, as sensitive information such as passwords or personal data can be easily accessed by unauthorized individuals. Therefore, it is important to use additional security measures, such as SSL/TLS encryption, to protect data when Basic Authentication is used.
45.
NetBIOS over TCP/IP allows files and/or printers to be shared over the network. You are trying to intercept the traffic from a victim machine to a corporate network printer. You are attempting to hijack the printer network connection from your laptop by sniffing the wire. Which port does SMB over TCP/IP use?
Correct Answer
D. 445
Explanation
SMB (Server Message Block) over TCP/IP uses port 445. By sniffing the wire, the attacker can intercept the traffic between the victim machine and the corporate network printer. Port 445 is the correct answer because it is the port used by SMB, which is responsible for file and printer sharing over the network.
46.
One of the ways to map a targeted network for live hosts is by sending an ICMP ECHO request to the broadcast or the network address. The request would be broadcasted to all hosts on the targeted network. The live hosts will send an ICMP ECHO Reply to the attacker's source IP address.
You send a ping request to the broadcast address 192.168.5.255.
There are 40 computers up and running on the target network. Only 13 hosts send a reply while others do not. Why?
Correct Answer
A. Windows machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address.
Explanation
Windows machines will not generate an answer (ICMP ECHO Reply) to an ICMP ECHO request aimed at the broadcast address or at the network address. This is why only 13 hosts out of the 40 computers on the target network send a reply, while the others do not.
47.
Charlie is the network administrator for his company. Charlie just received a new Cisco router and wants to test its capabilities out and to see if it might be susceptible to a DoS attack resulting in its locking up. The IP address of the Cisco switch is 172.16.0.45. What command can Charlie use to attempt this task?
Correct Answer
A. Charlie can use the command: ping -l 56550 172.16.0.45 -t.
Explanation
Charlie can use the command "ping -l 56550 172.16.0.45 -t" to attempt to test the capabilities of the new Cisco router and see if it is susceptible to a DoS attack resulting in its locking up.
48.
What type of encryption does WPA2 use?
Correct Answer
B. AES-CCMP 128 bit
Explanation
WPA2 (Wi-Fi Protected Access 2) uses AES-CCMP (Advanced Encryption Standard - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) with a key length of 128 bits. AES is a symmetric encryption algorithm widely used for securing sensitive data. CCMP is a cryptographic protocol that provides data confidentiality, integrity, and authentication. The combination of AES and CCMP ensures a high level of security for wireless networks.
49.
Attackers send an ACK probe packet with random sequence number, no response means port is filtered (Stateful firewall is present) and RST response means the port is not filtered. What type of Port Scanning is this?
Correct Answer
D. ACK flag scanning
Explanation
This type of port scanning is called ACK flag scanning. In this method, the attacker sends an ACK probe packet with a random sequence number. If there is no response, it indicates that the port is filtered, which means a stateful firewall is present. If a RST (reset) response is received, it means the port is not filtered.
50.
What is the command used to create a binary log file using tcpdump?
Correct Answer
A. Tcpdump -w ./log
Explanation
The command "tcpdump -w ./log" is used to create a binary log file using tcpdump. The "-w" option specifies the file name and location for the log file. In this case, the log file will be created in the current directory with the name "log".