312-50v13 Practice Test Questions

551 Questions


Topic 1 : Exam Pool A

Which of the following is a component of a risk assessment?


A. Administrative safeguards


B. Physical security


C. DMZ


D. Logical interface





A.
  Administrative safeguards

A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.
However, he is unable to capture any logons though he knows that other users are logging in.
What do you think is the most likely reason behind this?


A. There is a NIDS present on that segment.


B. Kerberos is preventing it.


C. Windows logons cannot be sniffed.


D. L0phtcrack only sniffs logons to web servers.





B.
  Kerberos is preventing it.

What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?


A. 110


B. 135


C. 139


D. 161


E. 445


F. 1024





B.
  135

C.
  139

E.
  445

Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B. How do you prevent DNS spoofing?


A. Install DNS logger and track vulnerable packets


B. Disable DNS timeouts


C. Install DNS Anti-spoofing


D. Disable DNS Zone Transfer





C.
  Install DNS Anti-spoofing

Which of the following is not a Bluetooth attack?


A. Bluedriving


B. Bluesmacking


C. Bluejacking


D. Bluesnarfing





A.
  Bluedriving

What is a NULL scan?


A. A scan in which all flags are turned off


B. A scan in which certain flags are off


C. A scan in which all flags are on


D. A scan in which the packet size is set to zero


E. A scan with an illegal packet size





A.
  A scan in which all flags are turned off

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. What Wireshark filter will show the connections from the snort machine to kiwi syslog machine?


A. tcp.srcport= = 514 && ip.src= = 192.168.0.99


B. tcp.srcport= = 514 && ip.src= = 192.168.150


C. tcp.dstport= = 514 && ip.dst= = 192.168.0.99


D. tcp.dstport= = 514 && ip.dst= = 192.168.0.150





D.
  tcp.dstport= = 514 && ip.dst= = 192.168.0.150

Susan has attached to her company's network. She has managed to synchronize her boss's sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory.
What kind of attack is Susan carrying on?


A. A sniffing attack


B. A spoofing attack


C. A man in the middle attack


D. A denial of service attack





C.
  A man in the middle attack

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?


A. Kismet


B. Abel


C. Netstumbler


D. Nessus





A.
  Kismet

What is the minimum number of network connections in a multihomed firewall?


A. 3


B. 5


C. 4


D. 2





A.
  3

During a black-box pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic?


A. Circuit


B. Stateful


C. Application


D. Packet Filtering





C.
  Application

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?


A. tcpsplice


B. Burp


C. Hydra


D. Whisker





D.
  Whisker


Page 6 out of 46 Pages
Previous