You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: "FTP on the network!";)
An Intrusion Detection System
A firewall IPTable
A Router IPTable
FTP Server rule
SHOW ANSWERWhich of the following open source tools would be the best choice to scan a network for potential targets?
NMAP
NIKTO
CAIN
John the Ripper
SHOW ANSWERWhich of the following is the successor of SSL?
TLS
RSA
GRE
IPSec
SHOW ANSWERWhich of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
Kismet
Nessus
Netstumbler
 nbsp;Abel
SHOW ANSWERUnder what conditions does a secondary name server request a zone transfer from a primary name server?
When a primary SOA is higher that a secondary SOA
When a secondary SOA is higher that a primary SOA
When a primary name server has had its service restarted
When a secondary name server has had its service restarted
When the TTL falls to zero
SHOW ANSWERWhich of the following can take an arbitrary length of input and produce a message digest output of 160 bit?
SHA-1
MD5
HAVAL
MD4
SHOW ANSWERYou went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place. Your peer, Peter Smith who works at the same department disagrees with you. He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain. What is Peter Smith talking about?
Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain
"zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks
"Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks
Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway
SHOW ANSWERWhich of the following types of firewalls ensures that the packets are part of the established session?
Stateful inspection firewall
Circuit-level firewall
Application-level firewall
Switch-level firewall
SHOW ANSWERYou are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. What wireshark filter will show the connections from the snort machine to kiwi syslog machine?
tcp.dstport==514 && ip.dst==192.168.0.150
tcp.srcport==514 && ip.src==192.168.0.99
tcp.dstport==514 && ip.dst==192.168.0.0/16
tcp.srcport==514 && ip.src==192.168.150
SHOW ANSWERWhich of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
Restore a random file.
Perform a full restore.
Read the first 512 bytes of the tape.
Read the last 512 bytes of the tape
SHOW ANSWERWhat would you type on the Windows command line in order to launch the Computer Management Console provided that you are logged in as an admin?
c:\compmgmt.msc
c:\gpedit I
c:\ncpa.cpl
c:\services.msc
SHOW ANSWERWhat is the role of test automation in security testing?
It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely.
It is an option but it tends to be very expensive.
It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies.
Test automation is not usable in security due to the complexity of the tests.
SHOW ANSWERWhich of the following programming languages is most vulnerable to buffer overflow attacks?
Perl
C++
Python
Java
SHOW ANSWERYou want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?
hping2 host.domain.com
hping2 --set-ICMP host.domain.com
hping2 -i host.domain.com
hping2 -1 host.domain.com
SHOW ANSWER