Which of the following statements is TRUE?
Sniffers operate on Layer 2 of the OSI model
Sniffers operate on Layer 3 of the OSI model
Sniffers operate on both Layer 2 & Layer 3 of the OSI model.
Sniffers operate on the Layer 1 of the OSI model
SHOW ANSWERWhile performing data validation of web content, a security technician is required to restrict malicious input. Which of the following processes is an efficient way of restricting malicious input?
Validate web content input for query strings.
Validate web content input with scanning tools.
Validate web content input for type, length, and range.
Validate web content input for extraneous queries.
SHOW ANSWERA bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?
Perform a vulnerability scan of the system.
Determine the impact of enabling the audit feature.
Allocate funds for staffing of audit log review.
SHOW ANSWERFirewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules. Which of the following types of firewalls can protect against SQL injection attacks?
Data-driven firewall
Stateful firewall
Packet firewall
Web application firewall
SHOW ANSWERWhich of these options is the most secure procedure for storing backup tapes?
In a climate controlled facility offsite
On a different floor in the same building
Inside the data center for faster retrieval in a fireproof safe
In a cool dry environment
SHOW ANSWERWhich of the following items of a computer system will an anti-virus program scan for viruses?
Boot Sector
Deleted Files
Password Protected Files
SHOW ANSWERWhen conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?
Modifying and replaying captured network traffic
Collecting unencrypted information about usernames and passwords
Capturing a network traffic for further analysis
SHOW ANSWERPassive reconnaissance involves collecting information through which of the following?
Social engineering
Network traffic sniffing
Man in the middle attacks
Publicly accessible sources
SHOW ANSWERIn cryptanalysis and computer security, 'pass the hash' is a hacking technique that allows an attacker to authenticate to a remote server/service by using the underlying NTLM and/or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case. Metasploit Framework has a module for this technique: psexec. The psexec module is often used by penetration testers to obtain access to a given system that you already know the credentials for. It was written by sysinternals and has been integrated within the framework. Often as penetration testers, successfully gain access to a system through some exploit, use meterpreter to grab the passwords or other methods like fgdump, pwdump, or cachedump and then utilize rainbowtables to crack those hash values. Which of the following is true hash type and sort order that is using in the psexec module's 'smbpass'?
NT:LM
LM:NT
LM:NTLM
NTLM:LM
SHOW ANSWERWhich of the following descriptions is true about a static NAT?
A static NAT uses a many-to-many mapping.
A static NAT uses a one-to-many mapping.
A static NAT uses a many-to-one mapping.
A static NAT uses a one-to-one mapping.
SHOW ANSWERSecurity Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy. What is the main theme of the sub-policies for Information Technologies?
Availability, Non-repudiation, Confidentiality
Authenticity, Integrity, Non-repudiation
Confidentiality, Integrity, Availability
Authenticity, Confidentiality, Integrity
SHOW ANSWERWhat are two things that are possible when scanning UDP ports? (Choose two.)
A reset will be returned
An ICMP message will be returned
The four-way handshake will not be completed
An RFC 1294 message will be returned
Nothing
SHOW ANSWERBased on the following extract from the log of a compromised machine, what is the hacker really trying to steal?
har.txt
SAM file
wwwroot
Repair file
SHOW ANSWERThe precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?
Physical
Procedural
Technical
Compliance
SHOW ANSWER