312-50v12 Practice Test Questions

569 Questions


Topic 2: Exam Pool B

What does the following command in netcat do?
nc -l -u -p55555 < /etc/passwd


A.

logs the incoming connections to /etc/passwd file


B.

loads the /etc/passwd file to the UDP port 55555


C.

grabs the /etc/passwd file when connected to UDP port 55555


D.

deletes the /etc/passwd file when connected to the UDP port 55555





C.
  

grabs the /etc/passwd file when connected to UDP port 55555



Fred is the network administrator for his company. Fred is testing an internal switch.
From an external IP address, Fred wants to try and trick this switch into thinking it already
has established a session with his computer. How can Fred accomplish this?


A.

Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source
address of his computer.


B.

He can send an IP packet with the SYN bit and the source address of his computer.


C.

Fred can send an IP packet with the ACK bit set to zero and the source address of the
switch.


D.

Fred can send an IP packet to the switch with the ACK bit and the source address of his
machine.





D.
  

Fred can send an IP packet to the switch with the ACK bit and the source address of his
machine.



John is an incident handler at a financial institution. His steps in a recent incident are not up
to the standards of the company. John frequently forgets some steps and procedures while
handling responses as they are very stressful to perform. Which of the following actions
should John take to overcome this problem with the least administrative effort?


A.

Create an incident checklist


B.

Select someone else to check the procedures


C.

Increase his technical skills


D.

Read the incident manual every time it occurs





C.
  

Increase his technical skills



Attacker Lauren has gained the credentials of an organization's internal server system, and
she was often logging in during irregular times to monitor the network activities. The
organization was skeptical about the login times and appointed security professional
Robert to determine the issue. Robert analyzed the compromised device to find incident
details such as the type of attack, its severity, target, impact, method of propagation, and
vulnerabilities exploited. What is the incident handling and response (IH&R) phase, in
which Robert has determined these issues?


A.

Preparation


B.

Eradication


C.

Incident recording and assignment


D.

Incident triage





D.
  

Incident triage



This form of encryption algorithm is asymmetric key block cipher that is characterized by a
128-bit block size, and its key size can be up to 256 bits. Which among the following is this
encryption algorithm?


A.

Twofish encryption algorithm


B.

HMAC encryption algorithm


C.

IDEA


D.

Blowfish encryption algorithm





A.
  

Twofish encryption algorithm



Explanation: Twofish is an encryption algorithm designed by Bruce Schneier. It’s a
symmetric key block cipher with a block size of 128 bits, with keys up to 256 bits. it’s
associated with AES (Advanced Encryption Standard) and an earlier block cipher called
Blowfish. Twofish was actually a finalist to become the industry standard for encryption, but
was ultimately beaten out by the present AES.Twofish has some distinctive features that
set it aside from most other cryptographic protocols. For one, it uses pre-computed, keydependent
S-boxes. An S-box (substitution-box) may be a basic component of any
symmetric key algorithm which performs substitution. within the context of Twofish’s block
cipher, the S-box works to obscure the connection of the key to the ciphertext. Twofish
uses a pre-computed, key-dependent S-box which suggests that the S-box is already
provided, but depends on the cipher key to decrypt the knowledge .
How Secure is Twofish?Twofish is seen as a really secure option as far as encryption
protocols go. one among the explanations that it wasn’t selected because the advanced
encryption standard is thanks to its slower speed. Any encryption standard that uses a 128-
bit or higher key, is theoretically safe from brute force attacks. Twofish is during this
category.Because Twofish uses “pre-computed key-dependent S-boxes”, it are often
susceptible to side channel attacks. this is often thanks to the tables being pre-computed.
However, making these tables key-dependent helps mitigate that risk. There are a couple
of attacks on Twofish, but consistent with its creator, Bruce Schneier, it didn’t constitute a
real cryptanalysis. These attacks didn’t constitue a practical break within the cipher.
Products That Use TwofishGnuPG: GnuPG may be a complete and free implementation of
the OpenPGP standard as defined by RFC4880 (also referred to as PGP). GnuPG allows
you to encrypt and sign your data and communications; it features a flexible key
management system, along side access modules for all types of public key
directories.KeePass: KeePass may be a password management tool that generates
passwords with top-notch security. It’s a free, open source, lightweight and easy-to-use
password manager with many extensions and plugins.Password Safe: Password Safe uses
one master password to stay all of your passwords protected, almost like the functionality
of most of the password managers on this list. It allows you to store all of your passwords
during a single password database, or multiple databases for various purposes. Creating a
database is straightforward , just create the database, set your master password.PGP
(Pretty Good Privacy): PGP is employed mostly for email encryption, it encrypts the content
of the e-mail . However, Pretty Good Privacy doesn’t encrypt the topic and sender of the email
, so make certain to never put sensitive information in these fields when using
PGP.TrueCrypt: TrueCrypt may be a software program that encrypts and protects files on
your devices. With TrueCrypt the encryption is transparent to the user and is completed locally at the user’s computer. this suggests you’ll store a TrueCrypt file on a server and
TrueCrypt will encrypt that file before it’s sent over the network.

Yancey is a network security administrator for a large electric company. This company
provides power for over 100, 000 people in Las Vegas. Yancey has worked for his
company for over 15 years and has become very successful. One day, Yancey comes in to
work and finds out that the company will be downsizing and he will be out of a job in two
weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and
backdoors all over the network to take down the company once he has left. Yancey does
not care if his actions land him in jail for 30 or more years, he just wants the company to
pay for what they are doing to him.
What would Yancey be considered?


A.

Yancey would be considered a Suicide Hacker


B.

Since he does not care about going to jail, he would be considered a Black Hat


C.

Because Yancey works for the company currently; he would be a White Hat


D.

Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing





A.
  

Yancey would be considered a Suicide Hacker



What hacking attack is challenge/response authentication used to prevent?


A.

Replay attacks


B.

Scanning attacks


C.

Session hijacking attacks


D.

Password cracking attacks





A.
  

Replay attacks



What is the purpose of DNS AAAA record?


A.

Authorization, Authentication and Auditing record


B.

Address prefix record


C.

Address database record


D.

IPv6 address resolution record





D.
  

IPv6 address resolution record



You are performing a penetration test for a client and have gained shell access to a
Windows machine on the internal network. You intend to retrieve all DNS records for the
internal domain, if the DNS server is at 192.168.10.2 and the domain name is
abccorp.local, what command would you type at the nslookup prompt to attempt a zone
transfer?


A.

list server=192.168.10.2 type=all


B.

is-d abccorp.local


C.

Iserver 192.168.10.2-t all


D.

List domain=Abccorp.local type=zone





B.
  

is-d abccorp.local



Attacker Steve targeted an organization's network with the aim of redirecting the company's
web traffic to another malicious website. To achieve this goal, Steve performed DNS cache
poisoning by exploiting the vulnerabilities In the DNS server software and modified the
original IP address of the target website to that of a fake website. What is the technique
employed by Steve to gather information for identity theft?


A.

Pretexting


B.

Pharming


C.

Wardriving


D.

Skimming





B.
  

Pharming



Explanation: A pharming attacker tries to send a web site’s traffic to a faux website
controlled by the offender, typically for the aim of collection sensitive data from victims or
putting in malware on their machines. Attacker tend to specialize in making look-alike ecommerce and digital banking websites to reap credentials and payment card data.
Though they share similar goals, pharming uses a special technique from phishing.
“Pharming attacker are targeted on manipulating a system, instead of tricking people into
reaching to a dangerous web site,” explains David Emm, principal security man of science
at Kaspersky. “When either a phishing or pharming attacker is completed by a criminal,
they need a similar driving issue to induce victims onto a corrupt location, however the
mechanisms during which this is often undertaken are completely different.”

Bob, an attacker, has managed to access a target loT device. He employed an online tool
to gather information related to the model of the loT device and the certifications granted to
it. Which of the following tools did Bob employ to gather the above Information?


A.

search.com


B.

EarthExplorer


C.

Google image search


D.

FCC ID search





D.
  

FCC ID search



Explanation: Footprinting techniques are used to collect basic information about the target
IoT and OT platforms to exploit them. Information collected through footprinting techniques
ncludes IP address, hostname, ISP, device location, banner of the target IoT device, FCC
ID information, certification granted to the device, etc. pg. 5052 ECHv11 manual
https://en.wikipedia.org/wiki/FCC_mark
An FCC ID is a unique identifier assigned to a device registered with the United States
Federal Communications Commission. For legal sale of wireless deices in the US,
manufacturers must:
· Have the device evaluated by an independent lab to ensure it conforms to FCC standards
· Provide documentation to the FCC of the lab results
· Provide User Manuals, Documentation, and Photos relating to the device
· Digitally or physically label the device with the unique identifier provided by the FCC (upon
approved application)
The FCC gets its authourity from Title 47 of the Code of Federal Regulations (47 CFR).
FCC IDs are required for all wireless emitting devices sold in the USA. By searching an
FCC ID, you can find details on the wireless operating frequency (including strength), photos of the device, user manuals for the device, and SAR reports on the wireless
emissions.

Bob was recently hired by a medical company after it experienced a major cyber security
breach. Many patients are complaining that their personal medical records are fully
exposed on the Internet and someone can find them with a simple Google search. Bob's
boss is very worried because of regulations that protect those data. Which of the following
regulations is mostly violated?


A.

HIPPA/PHl


B.

Pll


C.

PCIDSS


D.

ISO 2002





A.
  

HIPPA/PHl



Explanation: PHI stands for Protected Health info. The HIPAA Privacy Rule provides
federal protections for private health info held by lined entities and provides patients an
array of rights with regard to that info. under HIPAA phi is considered to be any identifiable
health info that’s used, maintained, stored, or transmitted by a HIPAA-covered entity – a
healthcare provider, health plan or health insurer, or a aid clearinghouse – or a business
associate of a HIPAA-covered entity, in relation to the availability of aid or payment for aid
services.
It is not only past and current medical info that’s considered letter under HIPAA Rules,
however also future info concerning medical conditions or physical and mental health
related to the provision of care or payment for care. phi is health info in any kind, together
with physical records, electronic records, or spoken info.
Therefore, letter includes health records, medical histories, lab check results, and medical
bills. basically, all health info is considered letter once it includes individual identifiers.
Demographic info is additionally thought of phi underneath HIPAA Rules, as square
measure several common identifiers like patient names, Social Security numbers, Driver’s
license numbers, insurance details, and birth dates, once they square measure connected
with health info.
The eighteen identifiers that create health info letter are:
Names
Dates, except year
phonephone numbers
Geographic information
FAX numbers
Social Security numbers
Email addresses
case history numbers
Account numbers
Health arrange beneficiary numbers
Certificate/license numbers
Vehicle identifiers and serial numbers together with license plates
Web URLs
Device identifiers and serial numbers
net protocol addresses
Full face photos and comparable pictures
Biometric identifiers (i.e. retinal scan, fingerprints)
Any distinctive identifying variety or code
One or a lot of of those identifiers turns health info into letter, and phi HIPAA Privacy Rule
restrictions can then apply that limit uses and disclosures of the data. HIPAA lined entities
and their business associates will ought to guarantee applicable technical, physical, and
body safeguards are enforced to make sure the confidentiality, integrity, and availability of
phi as stipulated within the HIPAA Security Rule.


Page 15 out of 48 Pages
Previous