In which of the following scanning techniques does a scanner connect to an FTP server and request that server to start data transfer to the third system?
John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.
Original cookie values:
ItemID1=2
ItemPrice1=900
ItemID2=1
ItemPrice2=200
Modified cookie values:
ItemID1=2
ItemPrice1=1
ItemID2=1
ItemPrice2=1
Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.
Which of the following hacking techniques is John performing?
Which of the following steps are generally followed in computer forensic examinations?
Each correct answer represents a complete solution. Choose three.
Fill in the blank with the appropriate layer name.
The Network layer of the OSI model corresponds to the _______________ layer of the TCP/IP model.
You work as a Network Administrator for NetTech Inc. To ensure the security of files, you encrypt data files using Encrypting File System (EFS). You want to make a backup copy of the files and maintain security settings. You can backup the files either to a network share or a floppy disk. What will you do to accomplish this?
Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.
Which of the following statements about Discretionary Access Control List (DACL) is true?
Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?
Which of the following protocols is used to query and modify information stored within the directory services?
Which of the following activities is used to take place after recording and registering an incident?
Which of the following is an international treaty that governs intellectual property?
Which of the following is a reason to implement security logging on a DNS server?
Which of the following rated systems of the Orange book has mandatory protection of the TCB?
Which of the following protocols work at the network layer?
Each correct answer represents a complete solution. Choose three.
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
Which of the following tabs will you click in the Internet Options dialog box to include a websites as a trusted site?
In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?
The _______ protocol allows applications to communicate across a network in a way designed to prevent eavesdropping and message forgery.
Which of the following can be prevented by an organization using job rotation and separation of duties policies?
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?
Which of the following is the method of hiding data within another media type such as graphic or document?
You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser 's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.PassGuide.com. What is the most likely cause?
A ________ attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts.
The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from children under __ years of age without verifiable permission of a parent?
Identify whether the given statement is true or false.
"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?
Each correct answer represents a complete solution. Choose two.
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
Fill in the blank with the appropriate layer name of the OSI model.
Secure Socket Layer (SSL) operates at the _____ layer of the OSI model.
You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. You want to prevent malicious e-mails from entering the network from the non-existing domains. What will you do to accomplish this?
Which of the following types of activities can be audited for security?
Each correct answer represents a complete solution. Choose three.
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?
Each correct answer represents a complete solution. Choose two.
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
In which of the following processes, a DNS server may return an incorrect IP address, diverting traffic to another computer?
John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about symmetric encryption are true?
Each correct answer represents a complete solution. Choose three.
Which of the following protocols is used with a tunneling protocol to provide security?
Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?
An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?
Which of the following is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number?
Which of the following statements about Denial-of-Service (DoS) attack are true?
Each correct answer represents a complete solution. Choose three.
Which of the following access control models requires centralize database of user accounts?
Which of the following are the major tasks of risk management?
Each correct answer represents a complete solution. Choose two.
Brutus is a password cracking tool that can be used to crack the following authentications:
•HTTP (Basic Authentication)
•HTTP (HTML Form/CGI)
•POP3 (Post Office Protocol v3)
•FTP (File Transfer Protocol)
•SMB (Server Message Block)
•Telnet
Which of the following attacks can be performed by Brutus for password cracking?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following services is provided by the message authentication code (MAC) ?
Mark works as a Webmaster for Infonet Inc. He sets up an e-commerce site. He wants to accept online payments through credit cards on this site. He wants the credit card numbers to be encrypted. What will Mark do to accomplish the task?
Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?
Which of the following is generally practiced by the police or any other recognized governmental authority?
In which of the following does a Web site store information such as user preferences to provide customized services to users?
Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.
You work as a Web Administrator for Perfect World Inc. The company is planning to host an Ecommerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it?
Each correct answer represents a part of the solution. Choose two.
Which of the following is required to be backed up on a domain controller to recover Active Directory?
Which of the following are the goals of the cryptographic systems?
Each correct answer represents a complete solution. Choose three.
Which of the following statements about Public Key Infrastructure (PKI) are true?
Each correct answer represents a complete solution. Choose two.
Which of the following performs packet screening for security on the basis of port numbers?
Which of the following VPN protocols offer encryption?
Each correct answer represents a complete solution. Choose two.
Which of the following services does Internet Information Server (IIS) provide along with HTTP?
Each correct answer represents a complete solution. Choose three.
You work as a Network Administrator for NetTech Inc. Employees in remote locations connect to the company's network using Remote Access Service (RAS). Which of the following will you use to protect the network against unauthorized access?
Which of the following standards is used in wireless local area networks (WLANs)?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:
•Gathering information
•Determining the network range
•Identifying active systems
Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?
Which of the following techniques are used to secure wireless networks?
Each correct answer represents a complete solution. Choose three.
Which of the following statements about role-based access control (RBAC) model is true?
Which of the following is a name, symbol, or slogan with which a product is identified?
Which of the following tools can be used to perform polymorphic shell code attacks?
Which of the following reads and writes data across network connections by using the TCP/IP protocol?
Which of the following statements about digital signature are true?
Each correct answer represents a complete solution. Choose two.
Which of the following is the method of hiding data within another media type such as graphic or document?
In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?
Which of the following terms is synonymous with the willful destruction of another person's property?
Which of the following protocols is used to retrieve e-mails from a remote mail server?
Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true?
Each correct answer represents a complete solution. Choose two.
Where are user accounts and passwords stored in a decentralized privilege management environment?
Which of the following are threats to network security?
Each correct answer represents a complete solution. Choose two.
Which of the following are default ports for the FTP service?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about Encapsulating Security Payload (ESP) are true?
Each correct answer represents a complete solution. Choose two.
Which of the following statements regarding Secure Sockets Layer (SSL) are true?
Each correct answer represents a complete solution. Choose all that apply.