1.
1 Which statement describes phone freaking?
Correct Answer
C. A hacker mimics a tone using a whistle to make free long-distance calls on an
analog telepHone network.
Explanation
Phone freaking refers to the act of manipulating the telephone system to make unauthorized calls or gain free access to long-distance calls. This was commonly done by hackers in the past by mimicking a specific tone using a whistle, which allowed them to bypass the system and make free long-distance calls on analog telephone networks.
2.
2 Which two statements describe access attacks? (Choose two.)
Correct Answer(s)
B. Password attacks can be implemented using brute-force attack methods, Trojan
Horses, or packet sniffers.
C. Buffer overflow attacks write data beyond the allocated buffer memory to
overwrite valid data or exploit systems to execute malicious code.
.
Explanation
Access attacks can take various forms, including password attacks and buffer overflow attacks. Password attacks involve using brute-force attack methods, Trojan Horses, or packet sniffers to gain unauthorized access to a system by guessing or stealing passwords. On the other hand, buffer overflow attacks exploit vulnerabilities in a system's memory allocation, causing data to be written beyond the allocated buffer memory. This can lead to overwriting valid data or executing malicious code, allowing attackers to gain unauthorized access or control over a system.
3.
Which type of software typically uses a network adapter card in promiscuous mode
to capture all network packets that are sent across a LAN?
Correct Answer
C. Packet sniffer
Explanation
A packet sniffer is a type of software that uses a network adapter card in promiscuous mode to capture all network packets sent across a LAN. It allows users to analyze and monitor network traffic, making it useful for network troubleshooting, security analysis, and network optimization. By capturing and analyzing packets, a packet sniffer can provide insights into network performance, identify potential security threats, and help diagnose network issues.
4.
4 What are three goals of a port scan attack? (Choose three.)
Correct Answer(s)
B. Determine potential vulnerabilities
C. Identify active services
E. Identify operating systems
Explanation
A port scan attack aims to determine potential vulnerabilities in a system by scanning for open ports and services. By identifying active services, an attacker can gather information about the target system and potentially exploit any vulnerabilities. Additionally, identifying the operating system can help the attacker tailor their attack to specific weaknesses or known vulnerabilities associated with that particular OS.
5.
What is a ping sweep?
Correct Answer
A. A ping sweep is a network scanning technique that indicates the live hosts in a
range of IP addresses.
Explanation
A ping sweep is a network scanning technique used to identify live hosts within a specific range of IP addresses. By sending ICMP echo requests (pings) to each IP address in the range, the scanner can determine which hosts are active and responsive. This can be useful for network administrators to monitor and troubleshoot their networks, as well as for potential attackers to identify potential targets.
6.
6 Which two are characteristics of DoS attacks? (Choose two.)
Correct Answer(s)
B. They attempt to compromise the availability of a network, host, or application.
E. Examples include smurf attacks and ping of death attacks.
Explanation
DoS attacks are characterized by attempts to compromise the availability of a network, host, or application. This means that the attacker aims to make the target system or service inaccessible or unusable for legitimate users. Examples of DoS attacks include smurf attacks and ping of death attacks. It is not necessary for DoS attacks to precede access attacks, and they are not always difficult to conduct or initiated only by skilled attackers. The mention of L0phtCrack is irrelevant to DoS attacks.
7.
What occurs during a spoofing attack?
Correct Answer
A. One device falsifies data to gain access to privileged information.
Explanation
During a spoofing attack, one device falsifies data in order to deceive a system or user and gain access to privileged information. This can involve impersonating a legitimate device or user, forging IP addresses or other identifying information, or manipulating data packets to trick the target system into granting unauthorized access. The attacker aims to exploit the trust placed in the falsified data to gain unauthorized privileges or steal sensitive information.
8.
Which technology is an example of a host-based intrusion prevention system?
Correct Answer
C. CSA
Explanation
CSA (Cisco Security Agent) is an example of a host-based intrusion prevention system. Host-based intrusion prevention systems are designed to protect individual hosts or devices from unauthorized access or malicious activities. CSA is a software agent that is installed on individual hosts and monitors the host's activity to detect and prevent intrusions. It analyzes system calls, network traffic, and other indicators to identify and block suspicious behavior. By running directly on the host, CSA can provide real-time protection and is particularly effective at detecting and preventing attacks that target specific vulnerabilities or exploit known weaknesses in the host's operating system or applications.
9.
Which two statements are characteristics of a virus? (Choose two.)
Correct Answer(s)
A. A virus typically requires end-user activation.
E. A virus can be dormant and then activate at a specific time or date.
Explanation
A virus typically requires end-user activation means that a virus cannot infect a system without the user taking some action, such as opening an infected email attachment or clicking on a malicious link. A virus can be dormant and then activate at a specific time or date means that a virus can remain inactive on a system until a predetermined time or date, at which point it may activate and start executing its malicious activities.
10.
What occurs during the persist phase of a worm attack?
Correct Answer
B. Modification of system files and registry settings to ensure that the attack
code is running
Explanation
During the persist phase of a worm attack, the attacker modifies system files and registry settings to ensure that the attack code is running. This allows the worm to maintain a persistent presence on the infected system, even after a reboot or attempted removal. By modifying these files and settings, the attacker ensures that the worm can continue to carry out its malicious activities without being easily detected or removed. This phase is crucial for the worm to establish control over the compromised system and maintain its ability to spread and cause further damage.
11.
An attacker is using a laptop as a rogue access point to capture all network
traffic from a targeted user. Which type of attack is this?
Correct Answer
C. Man in the middle
Explanation
This is a man-in-the-middle attack. In this scenario, the attacker is intercepting and capturing network traffic between the targeted user and the intended destination. By acting as a rogue access point, the attacker can eavesdrop on the communication, potentially gaining access to sensitive information such as login credentials or financial data. This type of attack allows the attacker to secretly intercept and manipulate the communication between two parties without their knowledge.
12.
A disgruntled employee is using Wireshark to discover administrative Telnet
usernames and passwords. What type of network attack does this describe?
Correct Answer
C. Reconnaissance
Explanation
The given scenario describes a disgruntled employee using Wireshark to uncover administrative Telnet usernames and passwords. This action falls under the category of reconnaissance. Reconnaissance refers to the process of gathering information about a target network or system, often with the intention of launching further attacks or exploiting vulnerabilities. In this case, the employee is actively seeking sensitive login credentials, indicating a reconnaissance attack.
13.
13 Which phase of worm mitigation involves terminating the worm process, removing
modified files or system settings that the worm introduced, and patching the
vulnerability that the worm used to exploit the system?
Correct Answer
D. Treatment
Explanation
The correct answer is treatment. In the context of worm mitigation, treatment refers to the phase where the worm process is terminated, any modified files or system settings introduced by the worm are removed, and the vulnerability that the worm exploited is patched. This phase aims to fully eliminate the worm's impact on the system and prevent any further exploitation.
14.
14 Which phase of worm mitigation requires compartmentalization and segmentation
of the network to slow down or stop the worm and prevent currently infected hosts
from targeting and infecting other systems?
Correct Answer
A. Containment pHase
Explanation
The containment phase of worm mitigation requires compartmentalization and segmentation of the network to slow down or stop the worm. This is done to prevent currently infected hosts from targeting and infecting other systems. By isolating the infected hosts and limiting their ability to spread the worm, the containment phase helps to control the outbreak and minimize further damage.
15.
What are three types of access attacks? (Choose three.)
Correct Answer(s)
A. Buffer overflow
C. Port redirection
D. Trust exploitation
Explanation
Buffer overflow, port redirection, and trust exploitation are all types of access attacks.
A buffer overflow attack occurs when a program or system tries to store more data in a buffer than it can handle, causing the excess data to overflow into adjacent memory areas and potentially allowing an attacker to execute malicious code.
Port redirection is a technique used by attackers to redirect network traffic from one port to another, allowing them to bypass security measures and gain unauthorized access to a system.
Trust exploitation involves taking advantage of the trust relationship between different entities within a system or network. By exploiting this trust, an attacker can gain unauthorized access to sensitive information or resources.
16.
Which type of security threat can be described as software that attaches to another program to execute a specific unwanted function ?
Correct Answer
A. Virus
Explanation
A virus is a type of security threat that can be described as software that attaches to another program to execute a specific unwanted function. Viruses are designed to replicate and spread themselves to other programs and systems, often causing damage or disrupting the normal functioning of the infected device. Unlike worms, which can spread independently, viruses require a host program to execute their malicious code. Proxy Trojan horse, Denial of Service Trojan horse, and worms are different types of security threats, but they do not specifically attach to another program like a virus does.
17.
What is a characteristic of a Trojan Horse ?
Correct Answer
A. A Trojan Horse can be carried in a virus or worm
Explanation
A Trojan Horse can be carried in a virus or worm, meaning that it can be hidden within these types of malicious software. This allows the Trojan Horse to be spread and delivered to unsuspecting users, who may unknowingly download the virus or worm containing the Trojan. Once inside a system, the Trojan Horse can carry out various malicious activities, such as stealing sensitive information, damaging files, or providing unauthorized access to the attacker. This characteristic of being able to piggyback on other types of malware makes Trojan Horses particularly dangerous and difficult to detect.