Jim, a professional hacker, targeted an organization that is operating critical Industrial
Infrastructure. Jim used Nmap to scan open pons and running services on systems
connected to the organization's OT network. He used an Nmap command to identify
Ethernet/IP devices connected to the Internet and further gathered Information such as the
vendor name, product code and name, device name, and IP address. Which of the
following Nmap commands helped Jim retrieve the required information?
A.
nmap -Pn -sU -p 44818 -script emp-info < Target IP >
B.
nmap -Pn -sT -p 46824A < Target ip >
C.
nmap -Pn-sT -scan-delay is -max-parallelism 1 -p < Port List >< Target IP >
D.
nmap -Pn -sT -p 102 -script s7-info < Target IP >
nmap -Pn -sT -p 102 -script s7-info < Target IP >
Which of the following tools can be used to perform a zone transfer?
A.
NSLookup
B.
Finger
C.
Dig
D.
Sam Spade
E.
Host
F.
Netcat
G.
Neotrace
NSLookup
Dig
Sam Spade
Host
Log monitoring tools performing behavioral analysis have alerted several suspicious logins
on a Linux server occurring during non-business hours. After further examination of all login
activities, it is noticed that none of the logins have occurred during typical work hours. A
Linux administrator who is investigating this problem realizes the system time on the Linux
server is wrong by more than twelve hours. What protocol used on Linux servers to
synchronize the time has stopped working?
A.
Time Keeper
B.
NTP
C.
PPP
D.
OSPP
NTP
Which type of security feature stops vehicles from crashing through the doors of a building?
A.
Bollards
B.
Receptionist
C.
Mantrap
D.
Turnstile
Bollards
John is an incident handler at a financial institution. His steps in a recent incident are not up
to the standards of the company. John frequently forgets some steps and procedures while
handling responses as they are very stressful to perform. Which of the following actions
should John take to overcome this problem with the least administrative effort?
A.
Create an incident checklist.
B.
Select someone else to check the procedures.
C.
Increase his technical skills.
D.
Read the incident manual every time it occurs.
Increase his technical skills.
Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if
he properly configures the firewall to allow access just to servers/ports, which can have
direct internet access, and block the access to workstations.
Bob also concluded that DMZ makes sense just when a stateful firewall is available, which
is not the case of TPNQM SA.
In this context, what can you say?
A.
Bob can be right since DMZ does not make sense when combined with stateless
firewalls
B.
Bob is partially right. He does not need to separate networks if he can create rules by
destination IPs, one by one
C.
Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations
D.
Bob is partially right. DMZ does not make sense when a stateless firewall is available
Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations
_________ is a tool that can hide processes from the process list, can hide files, registry
entries, and intercept keystrokes.
A.
Trojan
B.
RootKit
C.
DoS tool
D.
Scanner
E.
Backdoor
RootKit
What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?
A.
Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
B.
Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
C.
Symmetric encryption allows the server to security transmit the session keys out-ofband.
D.
Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography
Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?
A.
All three servers need to be placed internally
B.
A web server facing the Internet, an application server on the internal network, a database server on the internal network
C.
A web server and the database server facing the Internet, an application server on the internal network
D.
All three servers need to face the Internet so that they can communicate between themselves
A web server facing the Internet, an application server on the internal network, a database server on the internal network
While examining audit logs, you discover that people are able to telnet into the SMTP
server on port 25. You would like to block this, though you do not see any evidence of an
attack or other wrong doing. However, you are concerned about affecting the normal
functionality of the email server. From the following options choose how best you can
achieve this objective?
A.
Block port 25 at the firewall.
B.
Shut off the SMTP service on the server.
C.
Force all connections to use a username and password.
D.
Switch from Windows Exchange to UNIX Sendmail.
E.
None of the above.
None of the above.
Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)
A.
BA810DBA98995F1817306D272A9441BB
B.
44EFCE164AB921CQAAD3B435B51404EE
C.
0182BD0BD4444BF836077A718CCDF409
D.
CEC52EB9C8E3455DC2265B23734E0DAC
E.
B757BF5C0D87772FAAD3B435B51404EE
F.
E52CAC67419A9A224A3B108F3FA6CB6D
44EFCE164AB921CQAAD3B435B51404EE
B757BF5C0D87772FAAD3B435B51404EE
Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients.
You are requested to accept the offer and you oblige. After 2 days. Bob denies that he had
ever sent a mail. What do you want to ""know"" to prove yourself that it was Bob who had
send a mail?
A.
Authentication
B.
Confidentiality
C.
Integrity
D.
Non-Repudiation
Non-Repudiation
Page 18 out of 44 Pages |
Previous |