You are on page 1of 2

generation attac D.

Dumpster diving attac QUESTION NO: 122 The FIN flag is set and sent from host A to host B when hostA has no more data to transmit (Closing a TCP connection). This flag releases theconnection resources. However, host A can continue to receive data as long as theSYN sequence numbers of transmitted p ac ets from host B are lower than the pac et segment containing the set FIN flag . A. false B. trueAnswer: BExplanation:QUESTION NO: 123 Jason is the networ adm inistrator of Spears Technology. Hehas enabled SNORT IDS to detect attac s going through his networ . He receivesSnort SMS alerts on his iPhone whenever there i s an attempted intrusion to hisnetwor . He receives the following SMS message du ring the wee end. An attac er Chew Siew sitting in Beijing, China had just launc hed a remote scan on Jason\'snetwor with the hping command. Which of the follow ing hping2 command isresponsible for the above snort alert? A. chenroc s:/home/s iew # hping -S -R -P -A-F -U 192.168.2.56 -p 22 -c 5 -t 118 B. chenroc s:/home/s iew # hping -F -Q -J -A -C -W 192.168.2.56 -p 22 -c 5 -t 118 C. chenroc s:/home/ siew # hping -D -V -R -S -Z -Y 192.168.2.56 -p 22 -c 5 -t 118 D. chenroc s:/home /siew # hping -G -T -H -S -L -W 192.168.2.56 -p 22 -c 5 -t 118Answer: AExplanati on:QUESTION NO: 124 Leesa is the senior security analyst for a publicly tradedco mpany. The IT department recently rolled out an intranet for company use onlywit h information ranging from training, to holiday schedules, to human resourcesdat a. Leesa wants to ma e sure the site is not accessible from outside and she also wants to ensure the site is Sarbanes-Oxley (SOX) compliant. Leesa goes to a publ iclibrary as she wants to do some Google searching to verify whether the company \'sintranet is accessible from outside and has been indexed by Google. Leesa wan ts tosearch for a website title of \"intranet\" with part of the URL containing the word\"intranet\" and the words \"human resources\" somewhere in the webpage. WhatGoogle search will accomplish this? A. related:intranet allinurl:intranet:\ "humanresources\" B. cache:\"human resources\" inurl:intranet(SharePoint) C.inti tle:intranet inurl:intranet+intext:\"human resources\" D. site:\"humanresources\ "+intext:intranet intitle:intranetAnswer: CExplanation:QUESTION NO: 125 Bob has been hired to do a web application security test. Bobnotices that the site is dy namic and must ma e use of a bac end database. Bobwants to see if SQL Injection would be possible. What is the first character that Bobshould use to attempt br ea ing valid SQL request? A. Semi Column B. DoubleQuote C. Single Quote D. Excla mation Mar Answer: CExplanation: Topic 2,Volume BQUESTION NO: 126 Hampton is th e senior security analyst for the city of Answer: B Columbus in Ohio. His primary responsibility is to ensure that all physical andl ogical aspects of the city\'s computer networ are secure from all angles. Bill is anIT technician that wor s with Hampton in the same IT department. Bill\'s pr imaryresponsibility is to eep PC\'s and servers up to date and to eep trac of all theagency laptops that the company owns and lends out to its employees. Aft er Billsetup a wireless networ for the agency, Hampton made sure that everythin g wassecure. He instituted encryption, rotating eys, turned off SSID broadcasti ng, andenabled MAC filtering. According to agency policy, only company laptops a reallowed to use the wireless networ , so Hampton entered all the MAC addresses for those laptops into the wireless security utility so that only those laptops should beable to access the wireless networ . Hampton does not eep trac of all the laptops, but he is pretty certain that the agency only purchases Dell lapto ps. Hampton iscurious about this because he notices Bill wor ing on a Toshiba la ptop one day andsaw that he was on the Internet. Instead of jumping to conclusio ns, Hamptondecides to tal to Bill\'s boss and see if they had purchased a Toshi ba laptop insteadof the usual Dell. Bill\'s boss said no, so now Hampton is very curious to see howBill is accessing the Internet. Hampton does site surveys eve ry couple of days, andhas yet to see any outside wireless networ signals inside the company\'s building.How was Bill able to get Internet access without using an agency laptop? A. Billspoofed the MAC address of Dell laptop B. Bill connecte d to a Rogue access pointC. Toshiba and Dell laptops share the same hardware add ress D. Bill brute forcedthe Mac address ACLsExplanation:QUESTION NO: 127 LAN Ma

nager Passwords are concatenated to 14 bytes, andsplit in half. The two halves a re hashed individually. If the password is 7 charactersor less, than the second half of the hash is always: A. 0xAAD3B435B51404EE B.0xAAD3B435B51404AA C. 0xAAD3 B435B51404BB D.0xAAD3B435B51404CCAnswer: AExplanation:QUESTION NO: 128 When writ ing shellcodes, you must avoid ____________ because these will end the string. A. Root bytes B. Null bytes C. Char bytes D.Unicode bytesAnswer: BExplanation:QU ESTION NO: 129 Jess the hac er runs L0phtCrac \'s built-in sniffer utility thatg rabs SMB password hashes and stores them for offline crac ing. Once crac ed,thes e passwords can provide easy access to whatever networ resources the user accou nt has access to. But Jess is not pic ing up hashes from the networ . Why? A.The networ protocol is configured to use SMB Signing B. The physical networ wire is on fibre optic cable C. The networ protocol is configured to use IPSEC D.L0p htCrac SMB sniffing only wor s through Switches and not HubsAnswer: AExplanatio n:QUESTION NO: 130 Harold wor s for Jacobson Unlimited in the IT department as A nswer: D

You might also like