1.
EXPLOITS DEPEND ON
Correct Answer
D. ALL OF THE ABOVE
Explanation
Exploits depend on various factors, including the operating system (OS) and its configuration, the local area network (LAN), and the software configuration. These factors play a crucial role in determining the vulnerabilities and weaknesses that can be exploited by attackers. By targeting these aspects, hackers can gain unauthorized access, manipulate systems, or steal sensitive information. Therefore, all of the options mentioned in the question contribute to the likelihood and success of exploits.
2.
Registry key can be altered directly with?
Correct Answer
B. Registry Editor
Explanation
The correct answer is "Registry Editor". The Registry Editor is a tool in Windows operating systems that allows users to view, modify, and manage the registry database. The registry is a hierarchical database that stores configuration settings and options for the operating system and installed applications. By using the Registry Editor, users can directly alter registry keys and values to customize system settings or troubleshoot issues. Control Panel, Key Editor, and Control Editor are not valid options for directly altering registry keys.
3.
Forensic Examiners are interested in following file because these contain portions of all documents and other materials a user produce while using the computer ?
Correct Answer
B. Swap
Explanation
Forensic Examiners are interested in the swap file because it contains portions of all documents and other materials a user produces while using the computer. The swap file is a type of temporary file that the operating system uses to store data that cannot fit into the computer's RAM. It acts as a virtual memory extension and helps the system manage memory resources efficiently. Therefore, examining the swap file can provide valuable insights into the user's activities and the files they have accessed or created on the computer.
4.
Which of the following are the two primary U.S.Laws that address Cybercrime?
Correct Answer
C. 2510 and 2701
Explanation
The two primary U.S. laws that address Cybercrime are 2510 and 2701. These laws specifically target different aspects of cybercrime. Law 2510 focuses on the interception of electronic communications, while law 2701 deals with unauthorized access to stored electronic communications. Together, these laws aim to address various forms of cybercrime and protect against unauthorized access and interception of electronic communications.
5.
An access token dose not contain?
Correct Answer
B. Group identifier
Explanation
An access token is a credential that is used to authenticate and authorize a user or a process in a computer system. It contains information such as the security identifier (SID) which uniquely identifies the user or group, the date and time when the token was issued, and the user's rights and permissions. However, it does not contain the group identifier. Group identifiers are typically stored in separate data structures and are used to manage access control and group membership.
6.
Power-On Passwords are function of
Correct Answer
A. Computer Hardware
Explanation
Power-On Passwords are a security feature that is implemented at the hardware level of a computer. This means that the password is stored in the computer's BIOS or firmware, which is independent of the operating system or any software installed on the computer. The power-on password is typically required to be entered before the computer boots up, providing an extra layer of protection against unauthorized access to the system. Therefore, the correct answer is Computer Hardware.
7.
Which element of the Intellectual property law provides the creator of a work exclusive right for 17 Years?
Correct Answer
A. Patent
Explanation
Patent law provides the creator of a work exclusive rights for 17 years. A patent is a legal protection granted to inventors for their inventions, giving them the exclusive right to make, use, and sell their invention for a specific period of time. This exclusive right allows inventors to profit from their inventions and encourages innovation by providing a temporary monopoly. Copyright, on the other hand, protects original works of authorship such as books, music, and artwork. Trade secret and trademark laws protect confidential business information and brand names respectively.
8.
Digital certificates are used in the IPSec connection, What type of network infrastructure device issue digital certificate?
Correct Answer
D. CA
Explanation
CA stands for Certificate Authority. A Certificate Authority is a trusted third-party entity that issues digital certificates. These certificates are used to verify the authenticity and integrity of data transmitted over a network. In the context of IPSec connections, a CA would issue digital certificates to the network infrastructure devices involved in the communication, such as routers or firewalls. These certificates would then be used to establish secure and encrypted connections between these devices, ensuring the confidentiality and integrity of the transmitted data.
9.
CDMA stand for
Correct Answer
B. Code division multiple access
Explanation
CDMA stands for code division multiple access. This technology allows multiple users to share the same frequency band simultaneously by assigning a unique code to each user. It is a digital cellular technology widely used in mobile communication systems. Unlike other access methods, CDMA allows for efficient use of the available bandwidth and provides better call quality and capacity.
10.
TDMA Stands for
Correct Answer
A. Time Division Multiple Access
Explanation
TDMA stands for Time Division Multiple Access. This is a digital technology used in telecommunications to allow multiple users to share the same frequency channel by dividing the signal into different time slots. Each user is assigned a specific time slot during which they can transmit their data. This method helps to maximize the efficiency of the channel and allows for multiple users to access it simultaneously without interference.
11.
At which layer of the OSI communication model dose bridge operate?
Correct Answer
B. Datalink
Explanation
Bridges operate at the datalink layer of the OSI communication model. The datalink layer is responsible for transferring data between adjacent network nodes and ensuring error-free transmission. Bridges are devices that connect two or more local area networks (LANs) together, and they use MAC addresses to forward data packets between networks. Therefore, it is correct to say that bridges operate at the datalink layer.
12.
Which of the following federal Law makes it a crime to knowingly and intentionally use cellular telephones that are altered or have been cloned?
Correct Answer
D. 18 USC 1029
Explanation
18 USC 1029 is the correct answer because it is the federal law that specifically addresses the crime of knowingly and intentionally using altered or cloned cellular telephones. This law deals with fraudulent activities related to access devices, including cell phones, and prohibits the unauthorized use or trafficking of such devices. The other options, 18 USC 2701, 18 USC 2511, and 18 USC 2319, do not pertain to the specific crime mentioned in the question.
13.
Forensic ToolKit (FTK) is a?
Correct Answer
A. Software
Explanation
FTK (Forensic ToolKit) is a software used in digital forensics. It is a powerful tool that helps investigators analyze and recover digital evidence from various devices. With its advanced features and capabilities, FTK enables the examination of data, including deleted files and hidden information, to uncover crucial evidence for investigations. It is widely used by law enforcement agencies, government organizations, and cybersecurity professionals in solving criminal cases and conducting digital investigations. Therefore, the correct answer is software.
14.
FAT stands for
Correct Answer
A. File allocation tables
Explanation
FAT stands for file allocation tables. This is a file system used by older versions of Windows operating systems to organize and manage files on a storage device. The file allocation tables keep track of the location of each file on the storage device, allowing the operating system to access and retrieve the files efficiently.
15.
Which of the following is evidence that is not based on personal knowledge but that was told to the witness?
Correct Answer
D. Hearsay evidence
Explanation
Hearsay evidence refers to information that is not based on the personal knowledge of the witness but rather on what someone else has told them. It is considered unreliable because it is second-hand information and can be subject to distortion or misinterpretation. Therefore, hearsay evidence is not considered as strong or credible as evidence that is based on personal knowledge or direct observation.
16.
CDMA 2000-1x is network, which achieves data rates up to ...
Correct Answer
C. 2.4mbit/s
Explanation
CDMA 2000-1x is a network technology that allows for data transmission at a maximum rate of 2.4mbit/s. This means that the network is capable of achieving data rates up to 2.4 megabits per second.
17.
International roaming is not a problem for
Correct Answer
B. GSM
Explanation
GSM (Global System for Mobile Communications) is a standard for mobile phones that allows for international roaming. This means that GSM phones can be used in different countries without any issues, as long as the network supports GSM technology. CDMA (Code Division Multiple Access), on the other hand, is a different technology that is not as widely supported internationally. Therefore, international roaming can be a problem for CDMA phones. The correct answer, GSM, is the technology that does not face any issues with international roaming.
18.
ACL in the NT Security environment stands for
Correct Answer
D. None of these
19.
Enhanced GPRS can provide a maximum data rate of _______ by using eight-time slots.
Correct Answer
D. 384 kbps
Explanation
Enhanced GPRS can provide a maximum data rate of 384 kbps by using eight-time slots. This means that when all eight-time slots are utilized, the data transmission rate can reach up to 384 kbps. The other options, 275 kbps, 115 kbps, and 144 kbps, are not capable of achieving this maximum data rate with eight-time slots.
20.
The term DDoS expands to _______.
Correct Answer
B. Distributed Denial of Service
Explanation
DDoS stands for Distributed Denial of Service. This term refers to a type of cyber attack where multiple compromised computers are used to flood a target system or network with a massive amount of traffic, overwhelming its resources and causing it to become inaccessible to legitimate users. The distributed nature of this attack makes it difficult to mitigate and trace back to its source, as it involves multiple sources launching the attack simultaneously.
21.
The software Metasploit is used for _______.
Correct Answer
B. Vulnerability Assessment
Explanation
Metasploit is a software tool used for conducting vulnerability assessments. It helps in identifying and evaluating vulnerabilities in computer systems, networks, and applications. By simulating real-world attacks, Metasploit allows security professionals to assess the security posture of their systems and identify potential weaknesses. It provides a comprehensive framework for penetration testing and helps organizations proactively address vulnerabilities before they can be exploited by malicious actors. Therefore, the correct answer for this question is "Vulnerability Assessment".
22.
The term XSS refers to _______.
Correct Answer
C. Cross site scripting
Explanation
Cross-site scripting (XSS) refers to a type of security vulnerability where attackers inject malicious scripts into trusted websites viewed by other users. This allows the attacker to bypass security measures and execute malicious code on the victim's browser. XSS attacks can lead to various consequences, such as stealing sensitive information, session hijacking, or defacing websites. The correct answer is "Cross site scripting."
23.
The tool OllDbg is used for analyzing code for which operating system _______.
Correct Answer
A. Microsoft Windows
Explanation
OllDbg is a tool that is specifically designed for analyzing code on the Microsoft Windows operating system. It is not compatible with Linux or Macintosh operating systems. Therefore, the correct answer is Microsoft Windows.
24.
The operating system back track is used for _______.
Correct Answer
A. Penetration testing
Explanation
The operating system back track is used for penetration testing. This means that it is a specialized operating system designed for testing the security of computer systems and networks. It provides a wide range of tools and resources for assessing vulnerabilities, identifying potential exploits, and evaluating the effectiveness of security measures. By simulating real-world attacks, back track allows security professionals to identify and address weaknesses in a system's defenses, ultimately enhancing its overall security posture.
25.
John works as a C programmer. He develops the following C program: #include <stdlib.h> #include <stdio.h> #include <string.h> int buffer(char *str) { char buffer1[10]; strcpy(buffer1, str); return 1; } int main(int argc, char *argv[]) { buffer (argv[1]); printf("Executed\n"); return 1; } His program is vulnerable to a __________ attack.
Correct Answer
B. Buffer overflow
Explanation
The given C program is vulnerable to a buffer overflow attack. In the buffer() function, there is a buffer1 array of size 10. However, the strcpy() function is used to copy the contents of the input string (str) into buffer1 without checking the length. If the input string is longer than the size of buffer1, it will overflow and overwrite adjacent memory locations. This can lead to unexpected behavior, crashes, or even allow an attacker to execute arbitrary code. Therefore, the correct answer is buffer overflow.
26.
------------------------------- is the complete network configuration and information toolkit that uses multi-threaded and multi-connection technologies in order to be very fast and efficient.
Correct Answer
B. NetRanger
Explanation
NetRanger is the correct answer because it is a comprehensive network configuration and information toolkit that utilizes multi-threaded and multi-connection technologies to optimize speed and efficiency. It provides a range of tools and features for analyzing and monitoring network traffic, making it an effective solution for managing and controlling bandwidth usage.
27.
A _______________device is used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.
Correct Answer
A. Biometric
Explanation
A biometric device is used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Biometric devices can include fingerprint scanners, iris scanners, voice recognition systems, and facial recognition systems. These devices capture and analyze unique characteristics of an individual's body or behavior, such as fingerprints, iris patterns, voice patterns, or facial features, and use them to verify or identify a person's identity. This technology is commonly used in various applications, such as access control systems, time and attendance tracking, and border security.
28.
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network?
Correct Answer(s)
B. Wireless sniffer
D. Protocol analyzer
Explanation
A wireless sniffer and a protocol analyzer are both tools used to analyze network traffic. A wireless sniffer is specifically designed to intercept and log traffic passing over a digital network, including wireless networks. It can capture and analyze packets of data to trace specific transactions. A protocol analyzer, on the other hand, is a more general term that refers to a tool used to analyze and monitor network protocols. It can also intercept and log traffic passing over a digital network, making it another correct answer to the question.
29.
In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution.
Correct Answer(s)
A. The router does not find a valid operating system image.
B. The user interrupts the boot sequence.
Explanation
The system enters ROM monitor mode when the router does not find a valid operating system image or when the user interrupts the boot sequence. In the first case, if the router cannot find a valid operating system image to load, it will automatically enter ROM monitor mode. In the second case, if the user interrupts the boot sequence by pressing certain keys during the startup process, the router will also enter ROM monitor mode.
30.
Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?
Correct Answer
C. EGP
Explanation
EGP (Exterior Gateway Protocol) is the correct answer because it is specifically designed for exchanging routing information between gateways in a network of autonomous systems. EGP is an older protocol that is used to connect different autonomous systems and allows them to exchange routing information to determine the best path for data transmission. This protocol is used in large-scale networks where multiple autonomous systems are interconnected, such as the internet.
31.
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?
Correct Answer
D. Source Port Address
Explanation
The 16-bit field that identifies the source port number of the application program in the host that is sending the segment is the Source Port Address. This field is used to keep track of the source port number of the sender, allowing the recipient to identify the application program that sent the segment.
32.
______________________ is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed.
Correct Answer
A. Network Reconnaissance
Explanation
Network reconnaissance is the process of gathering information about a network or system with the intention of gaining unauthorized access. It involves scanning and probing the network to identify vulnerabilities and weaknesses that can be exploited. This activity is usually carried out by remote attackers who are not authorized to access the network. The goal of network reconnaissance is to gather enough information to plan and execute an attack, making it a crucial step in the hacking process.
33.
The _____________is an application layer protocol that is used between workstations and routers for transporting SNA/NetBIOS traffic over TCP sessions.
Correct Answer
A. DCAP
Explanation
DCAP stands for Data Link Switching Client Access Protocol. It is an application layer protocol that is used between workstations and routers for transporting SNA/NetBIOS traffic over TCP sessions. This protocol allows for the communication between devices on a network using the SNA/NetBIOS protocols, which are commonly used in IBM mainframe environments. DCAP helps to ensure the reliable and efficient transfer of data between workstations and routers, enabling seamless connectivity and communication within a network.
34.
Which of the following is a process that detects a problem, determines its cause, minimizes the damages, resolves the problem, and documents each step of response for future reference?
Correct Answer
A. Incident response
Explanation
Incident response is the correct answer because it involves the entire process of detecting a problem, identifying its cause, minimizing any damages caused, resolving the problem, and documenting each step taken for future reference. This process ensures that incidents are effectively managed and responded to in a systematic and organized manner. Incident handling, incident management, and incident planning are all related concepts but do not encompass the complete process described in the question.
35.
Which of the following is designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion?
Correct Answer
B. Fire alarm system
Explanation
A fire alarm system is designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion. It typically includes smoke detectors, heat detectors, or both, which can sense the presence of smoke or heat caused by a fire. When a fire is detected, the system will activate an alarm, alerting occupants of the building and allowing them to evacuate safely. This system is essential in providing early warning and preventing the spread of fires, potentially saving lives and minimizing property damage.
36.
Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?
Correct Answer
B. HIDS
Explanation
A Host-based Intrusion Detection System (HIDS) is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces. Unlike Network-based Intrusion Detection Systems (NIDS) that focus on monitoring network traffic, HIDS is installed on individual hosts and monitors activities within the host, such as file system changes, log file analysis, and system call monitoring. HIDS is particularly useful for detecting attacks that originate from within the system, such as unauthorized access attempts, malware infections, or suspicious behavior by users or processes.
37.
Which of the following types of VPN uses the Internet as its main backbone, allowing users, customers, and branch offices to access corporate network resources across various network architectures?
Correct Answer
D. Extranet-based VPN
Explanation
An extranet-based VPN uses the Internet as its main backbone, allowing users, customers, and branch offices to access corporate network resources across various network architectures. This type of VPN extends the corporate network to trusted external entities, such as business partners or suppliers, while still maintaining security and control over the network. It enables secure communication and collaboration between different organizations, allowing them to share resources and information while keeping sensitive data protected.
38.
Which of the following is a protocol that describes an approach to providing "streamlined" support of OSI application services on top of TCP/IP-based networks for some constrained environments?
Correct Answer
A. Lightweight Presentation Protocol
Explanation
The Lightweight Presentation Protocol is a protocol that describes an approach to providing "streamlined" support of OSI application services on top of TCP/IP-based networks for some constrained environments. This protocol is specifically designed to minimize the overhead associated with the presentation layer of the OSI model, making it suitable for resource-constrained devices or networks where efficiency is crucial. It allows for the efficient transfer of data between applications, ensuring that the necessary presentation layer functions are performed without adding unnecessary complexity or overhead.
39.
You are an Administrator for a network at an investment bank. You are concerned about individuals breeching your network and being able to steal data before you can detect their presence and shut down their access. Which of the following is the best way to address this issue?
Correct Answer
C. Implement a honey pot.
Explanation
Implementing a honey pot is the best way to address the issue of individuals breaching the network and stealing data before detection and access shutdown. A honey pot is a decoy system that appears to be part of the network but is actually isolated and closely monitored. It attracts attackers and allows the administrator to study their techniques and gather information about their activities without risking the actual network. This helps in identifying vulnerabilities and improving security measures to prevent future attacks.
40.
Which of the following is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients? Each correct answer represents a complete solution. Choose all that apply.
Correct Answer(s)
B. E-mail spam
C. Junk mail
Explanation
E-mail spam and junk mail are both practices of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. E-mail spam refers specifically to unwanted e-mails sent electronically, while junk mail refers to unwanted physical mail sent through traditional mail systems. Both practices are considered forms of unsolicited advertising or marketing. Email jamming and email spoofing are not related to sending unwanted e-mail messages in large quantities to indiscriminate recipients.
41.
Fill in the blank with the appropriate word. The ____________________risk analysis process analyzes the effect of a risk event deriving a numerical value.
Correct Answer
A. Quantitative
Explanation
The term "quantitative" refers to the process of analyzing the effect of a risk event and deriving a numerical value. In this context, it suggests that the risk analysis process involves quantifying the impact of a risk event in order to assess its significance. This approach allows for a more objective evaluation of risks and enables decision-makers to prioritize and allocate resources effectively.
42.
TACS Stands for ?
Correct Answer
A. Total Access Communication System
Explanation
TACS stands for Total Access Communication System. This term refers to a first-generation analog cellular phone system that was widely used in the 1980s. It was primarily used in Europe and offered improved coverage and capacity compared to previous systems. TACS allowed users to have total access to communication through their cellular devices.
43.
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?
Correct Answer
C. PSAD
Explanation
PSAD (Port Scan Attack Detector) is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic. PSAD is specifically designed to monitor and analyze network traffic and identify potential security threats, such as port scans, which can be indicative of an attacker attempting to gain unauthorized access to a system. By analyzing the iptables log messages, PSAD can identify patterns and anomalies in the network traffic, allowing administrators to take appropriate actions to protect their systems.
44.
Which of the following is a distributed multi-access network that helps in supporting integrated communications using a dual bus and distributed queuing?
Correct Answer
D. Distributed-queue dual-bus
Explanation
A distributed-queue dual-bus is a distributed multi-access network that supports integrated communications using a dual bus and distributed queuing. It allows multiple devices to access the network simultaneously by using two separate buses for transmitting and receiving data. The distributed queuing mechanism ensures fair access to the network resources, preventing congestion and improving overall network performance.
45.
Which of the following is a distributed application architecture that partitions tasks or workloads between service providers and service requesters? Each correct answer represents a complete solution.
Correct Answer(s)
B. Client-server networking
D. Client-server computing
Explanation
Client-server networking and client-server computing are both distributed application architectures that involve the partitioning of tasks or workloads between service providers and service requesters. In client-server networking, the tasks are divided between the client (service requester) and the server (service provider), where the client sends requests to the server for specific services or resources. Similarly, in client-server computing, the workload is divided between the client and the server, with the client responsible for initiating requests and the server responsible for processing and delivering the requested services or resources. Peer-to-peer networking and peer-to-peer computing, on the other hand, do not involve the partitioning of tasks between service providers and requesters, as they rely on direct communication and sharing of resources between peers without the need for a central server.
46.
Which of the following is an attack on a website that changes the visual appearance of the site and seriously damages the trust and reputation of the website?
Correct Answer
A. Website defacement
Explanation
Website defacement is an attack on a website that changes its visual appearance, often by replacing the original content with offensive or misleading information. This attack can seriously damage the trust and reputation of the website, as visitors may perceive it as compromised or untrustworthy. It can also lead to financial losses and legal consequences for the website owner.
47.
Which of the following cables is made of glass or plastic and transmits signals in the form of light?
Correct Answer
B. Fiber optic cable
Explanation
Fiber optic cable is made of glass or plastic and transmits signals in the form of light. Unlike other cables such as plenum cable, twisted pair cable, and coaxial cable, fiber optic cable uses light to transmit data rather than electrical signals. This allows for faster and more reliable transmission of data over long distances, making it ideal for high-speed internet connections and telecommunications networks.
48.
Which of the following is a network that supports mobile communications across an arbitrary number of wireless LANs and satellite coverage areas?
Correct Answer
B. GAN
Explanation
GAN stands for Global Area Network, which is a network that supports mobile communications across an arbitrary number of wireless LANs and satellite coverage areas. GAN allows seamless connectivity and roaming capabilities for mobile devices, allowing them to stay connected even when moving between different wireless LANs and satellite coverage areas. This makes GAN an ideal network for mobile communications on a global scale.
49.
A______________________ network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used for preventing the collision of data between two computers that want to send messages at the same time.
Correct Answer
A. Token Ring
Explanation
A Token Ring network is a local area network (LAN) where all computers are connected in a ring or star topology and a bit- or token-passing scheme is used to prevent data collision between two computers trying to send messages simultaneously. In this network, a token is passed from one computer to another, allowing only the computer with the token to send data. This ensures orderly data transmission and prevents data collisions.
50.
Which of the following techniques is used for drawing symbols in public places for advertising an open Wi-Fi wireless network?
Correct Answer
A. Warchalking
Explanation
Warchalking is the technique used for drawing symbols in public places to advertise an open Wi-Fi wireless network. It involves creating specific symbols or codes on walls or pavements to indicate the presence of a Wi-Fi network and its characteristics, such as its security status. This practice was popularized in the early 2000s as a way for tech-savvy individuals to share information about accessible Wi-Fi networks with others.