The network administrator at Spears Technology, Inc has configured the default gateway Cisco router's access-list as below: You are hired to conduct security testing on their network. You successfully brute-force the SNMP community string using a SNMP crack tool. The access-list configured at the router prevents you from establishing a successful connection. You want to retrieve the Cisco configuration from the router. How would you proceed?
Use the Cisco's TFTP default password to connect and download the configuration file
Run a network sniffer and capture the returned traffic with the configuration file from the router
Run Generic Routing Encapsulation (GRE) tunneling protocol from your computer to the router masking your IP address
Send a customized SNMP set request with a spoofed source IP address in the range -192.168.1.0
SHOW ANSWERIn order to prevent particular ports and applications from getting packets into an organization, what does a firewall check?
Network layer headers and the session layer port numbers
Presentation layer headers and the session layer port numbers
Application layer port numbers and the transport layer headers
Transport layer port numbers and application layer headers
SHOW ANSWERYou have successfully gained access to your client's internal network and successfully comprised a Linux server which is part of the internal IP network. You want to know which Microsoft Windows workstations have file sharing enabled. Which port would you see listening on these Windows machines in the network?
445
3389
161
1433
SHOW ANSWERThe following are types of Bluetooth attack EXCEPT_____?
Bluejacking
Bluesmaking
Bluesnarfing
Bluedriving
SHOW ANSWERDestination unreachable administratively prohibited messages can inform the hacker to what?
That a circuit level proxy has been installed and is filtering traffic
That his/her scans are being blocked by a honeypot or jail
That the packets are being malformed by the scanning software
That a router or other packet-filtering device is blocking traffic
That the network is functioning normally
SHOW ANSWERA possibly malicious sequence of packets that were sent to a web server has been captured by an Intrusion Detection System (IDS) and was saved to a PCAP file. As a network administrator, you need to determine whether this packets are indeed malicious. What tool are you going to use?
Intrusion Prevention System (IPS)
Vulnerability scanner
Protocol analyzer
Network sniffer
SHOW ANSWERWhich results will be returned with the following Google search query? site:target.com -site:Marketing.target.com accounting
Results matching all words in the query
Results matching "accounting" in domain target.com but not on the site Marketing.target.com
Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting
Results for matches on target.com and Marketing.target.com that include the word "accounting"
SHOW ANSWERWhat is the most common method to exploit the "Bash Bug" or "ShellShock" vulnerability?
Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server
Manipulate format strings in text fields
SSH
SYN Flood
SHOW ANSWERIt is an entity or event with the potential to adversely impact a system through unauthorized access, destruction, disclosure, denial of service or modification of data. Which of the following terms best matches the definition?
Threat
Attack
Vulnerability
Risk
SHOW ANSWERWhich of the following cryptography attack methods is usually performed without the use of a computer?
Ciphertext-only attack
Chosen key attack
Rubber hose attack
Rainbow table attack
SHOW ANSWERWhich statement best describes a server type under an N-tier architecture?
A group of servers at a specific layer
A single server with a specific role
A group of servers with a unique role
A single server at a specific layer
SHOW ANSWERWhen utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?
Vulnerability scanning
Social engineering
Application security testing
Network sniffing
SHOW ANSWERWhich statement is TRUE regarding network firewalls preventing Web Application attacks?
Network firewalls can prevent attacks because they can detect malicious HTTP traffic.
Network firewalls cannot prevent attacks because ports 80 and 443 must be opened.
Network firewalls can prevent attacks if they are properly configured.
Network firewalls cannot prevent attacks because they are too complex to configure.
SHOW ANSWERYou work as a Security Analyst for a retail organization. In securing the company's network, you set up a firewall and an IDS. However, hackers are able to attack the network. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?
False Negative
False Positive
True Negative
True Positive
SHOW ANSWER