Which Open Web Application Security Project (OWASP) implements a web application full of known vulnerabilities?
WebBugs
WebGoat
VULN_HTML
WebScarab
SHOW ANSWERIdentify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.
SQL injection attack
Cross-Site Scripting (XSS)
LDAP Injection attack
Cross-Site Request Forgery (CSRF)
SHOW ANSWERYou have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from this server will not be caught by a Network Based Intrusion Detection Systems (NIDS). What is the best way to evade the NIDS?
Encryption
Protocol Isolation
Alternate Data Streams
Out of band signalling
SHOW ANSWERWhat do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?
All are hacking tools developed by the legion of doom
All are tools that can be used not only by hackers, but also security personnel
All are DDOS tools
All are tools that are only effective against Windows E. All are tools that are only effective against Linux
SHOW ANSWERThe purpose of a __________ is to deny network access to local area networks and other information assets by unauthorized wireless devices.
Wireless Intrusion Prevention System
Wireless Access Point
Wireless Access Control List
Wireless Analyzer
SHOW ANSWERAn attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
He will activate OSPF on the spoofed root bridge.
He will repeat the same attack against all L2 switches of the network.
He will repeat this action so that it escalates to a DoS attack.
SHOW ANSWERDiffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?
768 bit key
1025 bit key
1536 bit key
2048 bit key
SHOW ANSWERWhich among the following is a Windows command that a hacker can use to list all the shares to which the current user context has access?
NET FILE
NET USE
NET CONFIG
NET VIEW
SHOW ANSWERIf executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation?
International
Criminal
Common
SHOW ANSWERWhat is the following command used for? net use \targetipc$ "" /u:""
Grabbing the etc/passwd file
Grabbing the SAM
Connecting to a Linux computer through Samba.
This command is used to connect as a null session
Enumeration of Cisco routers
SHOW ANSWERWhat hacking attack is challenge/response authentication used to prevent?
Replay attacks
Scanning attacks
Session hijacking attacks
Password cracking attacks
SHOW ANSWERWhich of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
SHA-2
SHA-3
SHA-1
SHA-0
SHOW ANSWERIn order to show improvement of security over time, what must be developed?
Reports
Testing tools
Metrics
Taxonomy of vulnerabilities
SHOW ANSWERDue to a slowdown of normal network operations, IT department decided to monitor internet traffic for all of the employees. From a legal stand point, what would be troublesome to take this kind of measure?
All of the employees would stop normal work activities
IT department would be telling employees who the boss is
Not informing the employees that they are going to be monitored could be an invasion of privacy.
The network could still experience traffic slow down.
SHOW ANSWER