- Set 1 (Q1 to Q30)
- Set 2 (Q31 to Q60)
- Set 3 (Q61 to Q90)
- Set 4 (Q91 to Q120)
- Set 5 (Q121 to Q150)
- Set 6 (Q151 to Q180)
- Set 7 (Q181 to Q210)
- Set 8 (Q211 to Q240)
- Set 9 (Q241 to Q270)
- Set 10 (Q271 to Q300)
- Set 11 (Q301 to Q330)
- Set 12 (Q331 to Q360)
- Set 13 (Q361 to Q390)
- Set 14 (Q391 to Q420)
- Set 15 (Q421 to Q450)
- Set 16 (Q451 to Q480)
- Set 17 (Q481 to Q510)
- Set 18 (Q511 to Q540)
- Set 19 (Q541 to Q570)
- Set 20 (Q571 to Q600)
- Set 21 (Q601 to Q630)
- Set 22 (Q631 to Q660)
- Set 23 (Q661 to Q690)
- Set 24 (Q691 to Q720)
Q541 - The collection of potentially actionable, overt, and publicly available information is known as
- Open-source intelligence
- Human intelligence
- Social intelligence
- Real intelligence
Q542 - Which of the following parameters enables NMAP's operating system detection feature?
- NMAP -sV
- NMAP -oS
- NMAP -sR
- NMAP -O
Q543 - Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange?
- single sign on
Q544 - What network security concept requires multiple layers of security controls to be placed throughout an IT infrastructure, which improves the security posture of an organization to defend against malicious attacks or potential vulnerabilities?
- Security through obscurity
- Host-Based Intrusion Detection System
- Defense in depth
- Network-Based Intrusion Detection System
Q545 - An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?
- Only using OSPFv3 will mitigate this risk.
- Make sure that legitimate network routers are configured to run routing protocols with authentication.
- Redirection of the traffic cannot happen unless the admin allows it explicitly.
- Disable all routing protocols and only use static routes.
Q546 - Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?
- They provide a repeatable framework.
- Anyone can run the command line scripts.
- They are available at low cost.
- They are subject to government regulation.
Q547 - Darius is analysing logs from IDS. He want to understand what have triggered one alert and verify if it's true positive or false positive. Looking at the logs he copy and paste basic details like below:
source IP: 192.168.21.100
source port: 80
destination IP: 192.168.10.23
destination port: 63221
What is the most proper answer.
- This is most probably true negative.
- This is most probably true positive which triggered on secure communication between client and server.
- This is most probably false-positive, because an alert triggered on reversed traffic.
- This is most probably false-positive because IDS is monitoring one direction traffic.
Q548 - You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's email, and you send her an email changing the source email to her boss's email( boss@company ). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don't work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use?
- Social engineering
Q549 - SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts. Which of the following features makes this possible? (Choose two.)
- It used TCP as the underlying protocol.
- It uses community string that is transmitted in clear text.
- It is susceptible to sniffing.
- It is used by all network devices on the market.
Answer: B and D
Q550 - Firewalk has just completed the second phase (the scanning phase) and a technician receives the output shown below. What conclusions can be drawn based on these scan results?
- The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host.
- The lack of response from ports 21 and 22 indicate that those services are not running on the destination server.
- The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall.
- The scan on port 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error.
Q551 - Which of the following is a component of a risk assessment?
- Physical security
- Administrative safeguards
- Logical interface
Q552 - Which cipher encrypts the plain text digit (bit or byte) one by one?
- Classical cipher
- Block cipher
- Modern cipher
- Stream cipher
Q553 - Which type of access control is used on a router or firewall to limit network activity?
Q554 - If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?
- Brute force
Q555 - Which of the following is designed to identify malicious attempts to penetrate systems?
- Intrusion Detection System
Q556 - Which of the following is assured by the use of a hash?
Q557 - What is the minimum number of network connections in a multi homed firewall?
Q558 - How does the Address Resolution Protocol (ARP) work?
- A. It sends a request packet to all the network elements, asking for the MAC address from a specific IP.
- It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.
- It sends a reply packet for a specific IP, asking for the MAC address.
- It sends a request packet to all the network elements, asking for the domain name from a specific IP.
Q559 - Which security strategy requires using several, varying methods to protect IT systems against attacks?
- Defense in depth
- Three-way handshake
- Covert channels
- Exponential backoff algorithm
Q560 - Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?
- Port scanning
- Banner grabbing
- Injecting arbitrary data
- Analyzing service response
Q561 - How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?
- There is no way to tell because a hash cannot be reversed
- The right most portion of the hash is always the same
- The hash always starts with AB923D
- The left most portion of the hash is always the same
- A portion of the hash will be all 0's
Q562 - Which of the following guidelines or standards is associated with the credit card industry?
- Control Objectives for Information and Related Technology (COBIT)
- Sarbanes-Oxley Act (SOX)
- Health Insurance Portability and Accountability Act (HIPAA)
- Payment Card Industry Data Security Standards (PCI DSS)
Q563 - Identify the correct terminology that defines the below statement.
- Vulnerability Scanning
- Penetration Testing
- Security Policy Implementation
- Designing Network Security
Q564 - An attacker tries to do banner grabbing on a remote web server and executes the following command.
What did the hacker accomplish?
- nmap can't retrieve the version number of any running remote service.
- The hacker successfully completed the banner grabbing.
- The hacker should've used nmap -O host.domain.com.
- The hacker failed to do banner grabbing as he didn't get the version of the Apache web server.
Q565 - What is the main difference between a "Normal" SQL Injection and a "Blind" SQL Injection vulnerability?
- The request to the web server is not visible to the administrator of the vulnerable application.
- The attack is called "Blind" because, although the application properly filters user input, it is still vulnerable to code injection.
- The successful attack does not show an error message to the administrator of the affected application.
- The vulnerable application does not display errors with information about the injection results to the attacker.
Q566 - Fingerprinting an Operating System helps a cracker because:
- It defines exactly what software you have installed
- It opens a security-delayed window based on the port being scanned
- It doesn't depend on the patches that have been applied to fix existing security holes
- It informs the cracker of which vulnerabilities he may be able to exploit on your system
Q567 - You are attempting to man-in-the-middle a session. Which protocol will allow you to guess a sequence number?
Q568 - First thing you do every office day is to check your email inbox. One morning, you received an email from your best friend and the subject line is quite strange. What should you do?
- Delete the email and pretend nothing happened.
- Forward the message to your supervisor and ask for her opinion on how to handle the situation.
- Forward the message to your company's security response team and permanently delete the messagefrom your computer.
- Reply to the sender and ask them for more information about the message contents.
Q569 - During a blackbox pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic?
- Packet Filtering
Q570 - Neil notices that a single address is generating traffic from its port 500 to port 500 of several other machines on the network. This scan is eating up most of the network bandwidth and Neil is concerned. As a security professional, what would you infer from this scan?
- It is a network fault and the originating machine is in a network loop
- It is a worm that is malfunctioning or hardcoded to scan on port 500
- The attacker is trying to detect machines on the network which have SSL enabled
- The attacker is trying to determine the type of VPN implementation and checking for IPSec