- Set 1 (Q1 to Q30)
- Set 2 (Q31 to Q60)
- Set 3 (Q61 to Q90)
- Set 4 (Q91 to Q120)
- Set 5 (Q121 to Q150)
- Set 6 (Q151 to Q180)
- Set 7 (Q181 to Q210)
- Set 8 (Q211 to Q240)
- Set 9 (Q241 to Q270)
- Set 10 (Q271 to Q300)
- Set 11 (Q301 to Q330)
- Set 12 (Q331 to Q360)
- Set 13 (Q361 to Q390)
- Set 14 (Q391 to Q420)
- Set 15 (Q421 to Q450)
- Set 16 (Q451 to Q480)
- Set 17 (Q481 to Q510)
- Set 18 (Q511 to Q540)
- Set 19 (Q541 to Q570)
- Set 20 (Q571 to Q600)
- Set 21 (Q601 to Q630)
- Set 22 (Q631 to Q660)
- Set 23 (Q661 to Q690)
- Set 24 (Q691 to Q720)
Q331 - While performing data validation of web content, a security technician is required to restrict malicious input. Which of the following processes is an efficient way of restricting malicious input?
- Validate web content input for query strings.
- Validate web content input with scanning tools.
- Validate web content input for type, length, and range.
- Validate web content input for extraneous queries.
Q332 - A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?
- Perform a vulnerability scan of the system.
- Determine the impact of enabling the audit feature.
- Perform a cost/benefit analysis of the audit feature.
- Allocate funds for staffing of audit log review.
Q333 - Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules. Which of the following types of firewalls can protect against SQL injection attacks?
- Data-driven firewall
- Stateful firewall
- Packet firewall
- Web application firewall
Q334 - Which of these options is the most secure procedure for storing backup tapes?
- In a climate controlled facility offsite
- On a different floor in the same building
- Inside the data center for faster retrieval in a fireproof safe
- In a cool dry environment
Q335 - Which of the following items of a computer system will an anti-virus program scan for viruses?
- Boot Sector
- Deleted Files
- Windows Process List
- Password Protected Files
Q336 - When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?
- Identifying operating systems, services, protocols and devices
- Modifying and replaying captured network traffic
- Collecting unencrypted information about usernames and passwords
- Capturing a network traffic for further analysis
Q337 - Passive reconnaissance involves collecting information through which of the following?
- Social engineering
- Network traffic sniffing
- Man in the middle attacks
- Publicly accessible sources
Q338 - In cryptanalysis and computer security, 'pass the hash' is a hacking technique that allows an attacker to authenticate to a remote server/service by using the underlying NTLM and/or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case. Metasploit Framework has a module for this technique: psexec. The psexec module is often used by penetration testers to obtain access to a given system that you already know the credentials for. It was written by sysinternals and has been integrated within the framework. Often as penetration testers, successfully gain access to a system through some exploit, use meterpreter to grab the passwords or other methods like fgdump, pwdump, or cachedump and then utilize rainbowtables to crack those hash values. Which of the following is true hash type and sort order that is using in the psexec module's 'smbpass'?
Q339 - Which of the following descriptions is true about a static NAT?
- A static NAT uses a many-to-many mapping.
- A static NAT uses a one-to-many mapping.
- A static NAT uses a many-to-one mapping.
- A static NAT uses a one-to-one mapping.
Q340 - Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy. What is the main theme of the sub-policies for Information Technologies?
- Availability, Non-repudiation, Confidentiality
- Authenticity, Integrity, Non-repudiation
- Confidentiality, Integrity, Availability
- Authenticity, Confidentiality, Integrity
Q341 - What are two things that are possible when scanning UDP ports? (Choose two.)
- A reset will be returned
- An ICMP message will be returned
- The four-way handshake will not be completed
- An RFC 1294 message will be returned
Answer: B and E
Q342 - Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?
- SAM file
- Repair file
Q343 - The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?
Q344 - Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve's approach. After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:
- Although the approach has two phases, it actually implements just one authentication factor
- The solution implements the two authentication factors: physical object and physical characteristic
- The solution will have a high level of false positives
- Biological motion cannot be used to identify people
Q345 - A pentester gains access to a Windows application server and needs to determine the settings of the built-in Windows firewall. Which command would be used?
- Netsh firewall show config
- WMIC firewall show config
- Net firewall show config
- Ipconfig firewall show config
Q346 - You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?
- Cain & Abel
Q347 - The use of alert thresholding in an IDS can reduce the volume of repeated alerts, but introduces which of the following vulnerabilities?
- An attacker, working slowly enough, can evade detection by the IDS.
- Network packets are dropped if the volume exceeds the threshold.
- Thresholding interferes with the IDS' ability to reassemble fragmented packets.
- The IDS will not distinguish among packets originating from different sources.
Q348 - Look at the following output. What did the hacker accomplish?
- The hacker used whois to gather publicly available records for the domain.
- The hacker used the "fierce" tool to brute force the list of available domains.
- The hacker listed DNS records on his own domain.
- The hacker successfully transferred the zone and enumerated the hosts.
Q349 - What is the correct PCAP filter to capture all TCP traffic going to or from host 192.168.0.125 on port 25?
- tcp.src == 25 and ip.host == 192.168.0.125
- host 192.168.0.125:25
- port 25 and host 192.168.0.125
- tcp.port == 25 and ip.host == 192.168.0.125
Q350 - A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The ps command shows that the nc file is running as process, and the netstat command shows the nc process is listening on a network port. What kind of vulnerability must be present to make this remote attack possible?
- File system permissions
- Privilege escalation
- Directory traversal
- Brute force login
Q351 - You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through.
What seems to be wrong?
- OS Scan requires root privileges.
- The nmap syntax is wrong.
- This is a common behavior for a corrupted nmap application.
- The outgoing TCP/IP fingerprinting is blocked by the host firewall.
Q352 - A hacker is attempting to use nslookup to query Domain Name Service (DNS). The hacker uses the nslookup interactive mode for the search. Which command should the hacker type into the command shell to request the appropriate records?
- Locate type=ns
- Request type=ns
- Set type=ns
- Transfer type=ns
Q353 - Which of the following processes evaluates the adherence of an organization to its stated security policy?
- Vulnerability assessment
- Penetration testing
- Risk assessment
- Security auditing
Q354 - What is the main reason the use of a stored biometric is vulnerable to an attack?
- The digital representation of the biometric might not be unique, even if the physical characteristic is unique.
- Authentication using a stored biometric compares a copy to a copy instead of the original to acopy.
- A stored biometric is no longer "something you are" and instead becomes "something you have".
- A stored biometric can be stolen and used by an attacker to impersonate the individual identified by the biometric.
Q355 - A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted. Which cryptography attack is the student attempting?
- Man-in-the-middle attack
- Brute-force attack
- Dictionary attack
- Session hijacking
Q356 - Which of the following is the best countermeasure to encrypting ransomwares?
- Use multiple antivirus softwares
- Keep some generation of off-line backup
- Analyze the ransomware to get decryption key of encrypted data
- Pay a ransom
Q357 - You have successfully compromised a machine on the network and found a server that is alive on the same network. You tried to ping it but you didn't get any response back. What is happening?
- ICMP could be disabled on the target server.
- The ARP is disabled on the target server.
- TCP/IP doesn't support ICMP.
- You need to run the ping command with root privileges.
Q358 - Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?
- Cain and Abel
Q359 - A security engineer is attempting to map a company's internal network. The engineer enters in the following NMAP command:
NMAP -n -sS -P0 -p 80 ***.***.**.**
What type of scan is this?
- Quick scan
- Intense scan
- Stealth scan
- Comprehensive scan
Q360 - Which of the following is an example of an asymmetric encryption implementation?