Sie sind auf Seite 1von 17

PARTE 4

Pregunta 1:
Which DoS attack sends traffic to the target with a spoofed IP of the target
itself?
a- Land
b- Teardrop
c- SYN flood
d- Smurf

Explicación:A land attack fits this description. Smurf Attacks deal with ICMP echo
requests going back to a spoofed target address. SYN floods use custom packets that
barrage a target with requests. Teardrop attacks use custom fragmented packets that
have overlapping offsets.

Pregunta 2:
If you can’t gain enough information directly from a target, what is another
option?
a- Competitive analysis
b- EDGAR
c- Scanning
d- Social engineering

Explicación:. Competitive analysis can prove very effective when you’re trying to gain
more detailed information about a target. Competitive analysis relies on looking at a
target’s competitors in an effort to find out more about the target.

Pregunta 3:
Which of the following is not typically used during footprinting?
a- Email
b- Port scanning
c- Search engines
d- Google hacking

Explicación:Port scanning is typically reserved for later stages of the attack process.
Pregunta 4:
Jason is the local network administrator who has been tasked with securing the
network from possible DoS attacks. Within the last few weeks, some traffic logs
appear to have internal clients making requests from outside the internal LAN.
Based on the traffic Jason has been seeing, what action should he take?
a- Implement ingress filtering
b- Implement egress filtering
c- Trottle network traffic
d- Update antivirus definitions

Explicación:Throttling network traffic will slow down a potential DoS attack; however,
an ingress filter will check for internal addresses coming in from the public side. This is
a good indicator of a spoofed IP.

Pregunta 5:
Which of the following best describes footprinting?
a- Discussion with people
b- Enumeration of services
c- Investigation of a target
d- Discovery of services

Explicación:Footprinting is the gathering of information relating to an intended target.


The idea is to gather as much information about the target as possible before starting
an attack.

Pregunta 6:
Which of the following is used to access content outside the root of a website?
a- SQL injection
b- Brute forcé
c- Port scanning
d- Directory traversal

Explicación:Directory traversals are used to browse outside the root of the site or
location and access files or directories that should otherwise be hidden.

Pregunta 7:
Databases can be a victim of code exploits depending on which of the
following?
a- Patches
b- Configuration
c- Client version
d- Vendor

Explicación:Databases can be a victim of source code exploits, depending on their


configuration and design.

Pregunta 8:
What is the role of social engineering?
a- To gain information about posts and cameras
b- To gain information about social media
c- To gain information from human beings
d- To gain information about computers

Explicación:Social engineering can gain information about computers and other


items, but it does so by interacting with people to extract that information.

Pregunta 9:
What is the hexadecimal value of a NOP instruction in an Intel system?
a- 0x99
b- 0x90
c- 0x80
d- 99x0

Explicación:0x90 is the hexadecimal value of a NOP instruction for Intel-based


systems. Remember to keep an eye out for this value; it indicates a NOP and possibly
a NOP sled, which could indicate a buffer overflow condition in progress.

Pregunta 10:
Footprinting has two phases. What are they?
a- Social and anonymous
b- Active and pseudonymous
c- Scanning and enumerating
d- Active and passive
Explicación:Footprinting is typically broken into active and passive phases, which are
characterized by how aggressive the process actually is. Active phases are much
more aggressive than their passive counterparts.

Pregunta 11:
Why use Google hacking?
a- To look for information about google
b- To fine-tune search results
c- To speed up searches
d- To target domain

Explicación:Google hacking is used to produce more targeted and useful search


results than would be possible using normal searches.

Pregunta 12:
Which of the following can prevent bad input from being presented to an
application through a form?
a- Directory traversing
b- Request filtering
c- Input scanning
d- Input validation

Explicación:Input validation is the process of checking input for correctness prior to its
being accepted by an application. Unlike filtering, which works on the server side,
validation works on the client side and prevents bad input from making it to the server.

Pregunta 13:
WEP is designed to offer security comparable to which of the following?
a- Wired networks
b- Bluetooth
c- IPv6
d- IrDA

Explicación:WEP is intended to offer security comparable to that experienced on


traditional wired networks. In practice the security has been less than intended.

Pregunta 14:
Which of the following would be a very effective source of information as it
relates to social engineering?
a- Social networking
b- Port scanning
c- Job boards
d- Websites

Explicación:Social networking has proven especially effective for social engineering


purposes. Due to the amount of information people tend to reveal on these sites, they
make prime targets for information gathering.

Pregunta 15:
Footprinting can determine all of the following except __________?
a- Hardware types
b- Business processes
c- Distribution and number of personnel
d- Software types

Explicación:Footprinting is not very effective at gaining information about the number


of personnel.

Pregunta 16:
Which of the following is designed to locate wireless access points?
a- Site survey
b- Traffic analysis
c- Pattern recognition
d- Cracking

Explicación:The purpose of a site survey is to map out a site and locate access points
and other wireless-enabled devices.

Pregunta 17:
Which of the following can be used to tweak or fine-tune search results?
a- Refining
b- Hacking
c- Operators
d- Archiving
Explicación:Operators such as filetype are used to manipulate search results for
some search engines such as Google.

Pregunta 18:
Which of the following operates at 5 GHz?
a- 802.11b
b- 802.11a
c- 802.11g
d- 802.11i

Explicación:802.11a operates exclusively at the 5 GHz frequency range, whereas


802.11b and 802.11g operate at the 2.54 GHz range. The newer 802.11n standard
can operate at both frequency ranges.

Pregunta 19:
Android is based on which operating system?
a- Windows
b- Unix
c- Linux
d- OS X

Explicación
Android is based on Linux.

Pregunta 20:
Which tool can trace the path of a packet?
a- DNS
b- Ping
c- Whois
d- Tracert

Explicación:Tracert is a tool used to trace the path of a packet from source to ultimate
destination.

PARTE 5
Pregunta 1:
Which of the following types of attack has no flags set?
a- NULL
b- FIN
c- SYN
d- Xmas tree
Explicación: A NULL scan has no flags configured on its packets.

Pregunta 2:
Which of the following is used to perform customized network scans?
a- AirPcap
b- Nessus
c- Nmap
d- Wireshark
Explicación:Nmap is a utility used to scan networks and systems and for other
types of custom scans.

Pregunta 3:
Which best describes a vulnerability scan?
a- A way to automate the Discovery of vulnerabilities
b- A proxy attack
c- A way to diagram a network
d- A way to find open ports

Explicación:Vulnerability scans are designed to pick up weaknesses in a system.


They are typically automated.

Pregunta 4:
A full-open scan means that the three-way handshake has been completed.
What is the difference between this and a half-open scan?
a- A half-open uses TCP
b- A half-open does not include the final ACK
c- A half-open includes the final ACK
d- A half-open uses UDP

Explicación:A three-way handshake is part of every TCP connection and


happens at the beginning of every connection. In the case of a half-open scan,
however, a final ACK is not sent, therefore leaving the connection halfway
complete.
Pregunta 5:
Which of the following can be used to evade an IDS?
a- Port scanning
b- Packet sniffing
c- Encryption
d- Enumeration

Explicación:Encryption can be used to avoid specific types of firewalls because


of their inability to decrypt the traffic.

Pregunta 6:
SaaS is a cloud hosting environment that offers what?
a- Testing options
b- Improved security
c- Software hosting
d- Development options

Explicación:SaaS, or Software as a Service, is an environment used to host software


services offsite and possibly license just what a company needs and only for as long
as they need it.

Pregunta 7:
What is the proper sequence of the TCP three-way-handshake?
a- SYN-ACK.ACK.ACK
b- SYN-SYN,SYN-ACK,SYN
c- SYN,SYN-ACK.ACK
d- ACK, SYN-ACK,SYN

Explicación:Remember this three-way handshake sequence; you will see it quite a bit
in packet captures when sniffing the network. Being able to identify the handshake
process allows you to quickly find the beginning of a data transfer.

Pregunta 8:
What is the purpose of a proxy?
a- To assist in scanning
b- To keep a scan hidden
c- To perform a scan
d- To automate the Discovery of vulnerabilities
Pregunta 9:
Physical security can prevent which of the following?
a- FTP
b- Tailgating
c- Cracking
d- DDoS

Explicación:Tailgating is an attack where an intruder follows an approved


individual into a facility. Devices such as mantraps can thwart this attack

Pregunta 10:
A public and private key system differs from symmetric because it uses which of
the following?
a- One algorithm
b- Two keys
c- Two algorithms
d- One key

Explicación:A public and private key are mathematically related keys, but they
are not identical. In symmetric systems only one key is used at a time.

Pregunta 11:
Which of the following is not a flag on a packet?
a- END
b- RST
c- URG
d- PSH

Explicación:END is not a type of flag. Valid flags are ACK, FIN, SYN, URG, RST,
and PSH.

Pregunta 12:
Which of the following is used for banner grabbing?
a- Wireshark
b- Telnet
c- FTP
d- SSH
Explicación:Telnet is used to perform banner grabs against a system. However, other
tools are available to do this as well.

Pregunta 13:
Which of the following can be used to identify a firewall?
a- Google hacking
b- Email
c- Search engines
d- Port scanning

Explicación:Port scanning can be used to identify certain firewalls because specific


ports are known to be open and available on some firewalls.

Pregunta 14:
What is the sequence of the three-way handshake?
a- SYN,ACK,ACK
b- SYN,ACK,SYN-ACK
c- SYN,SYN-ACK
d- SYN,SYN-ACK,ACK

Explicación:A three-way handshake is part of every TCP connection and happens at


the beginning of every connection. It includes the sequence SYN, SYN-ACK, ACK to
be fully completed.

Pregunta 15:
What is the three-way handshake?
a- The opening sequence of a TCP connection
b- A type of half-open scan
c- Part of a UDP scan
d- A Xmas tree scan

Explicación:The three-way handshake happens at the beginning of every TCP


connection.

Pregunta 16:
Which network topology uses a token-based access methodology?
a- Bus
b- Ring
c- Star
d- Ethernet

Explicación:Token ring networks use a token-based access methodology. Each


node connected to the network must wait for possession of the token before it
can send traffic via the ring.

Pregunta 17:
An HIDS is used to monitor activity on which of the following?
a- Application
b- Host
c- Network
d- Log file

Explicación:An HIDS (host-based intrusion detection system) is used to monitor


security violations on a particular host.

Pregunta 18:
What is an ICMP echo scan?
a- A SYN scan
b- A ping sweep
c- A Xmas tree scan
d- Part of a UDP scan

Explicación:An ICMP echo scan is a ping sweep-type scan.

Pregunta 19:
Which of these protocols is a connection-oriented protocol?
a- FTP
b- UDP
c- POP3
d- TCP

Explicación:Transmission Control Protocol (TCP) is a connection-oriented protocol


that uses the three-way-handshake to confirm that a connection is established. FTP
and POP3 use connections, but they are not connection-oriented protocols.
Pregunta 20:
An SYN attack uses which protocol?
a- HTTP
b- UDP
c- TCP
d- Telnet

Explicación:SYN flags are seen only on TCP-based transmissions and not in UDP
transmissions of any kind.

PARTE 6
Pregunta 1:
SNScan is used to access information for which protocol?
a- SMTP
b- FTP
c- HTTP
d- SNMP
Explicación:SNScan is designed to access and display information for SNMP.

Pregunta 2:
Enumeration does not uncover which of the following pieces of information?
a- Services
b- Ports
c- Shares
d- User accounts

Explicación:Ports are usually uncovered during the scanning phase and not the
enumeration phase.

Pregunta 3:
Enumeration is useful to system hacking because it provides which of the
following?
a- IP ranges
b- Configurations
c- Passwords
d- Usernames
Explicación:Usernames are especially useful in the system hacking process
because they allow you to target accounts for password cracking.

Pregunta 4:
Which ports does SNMP use to function?
a- 161 and 162
b- 389 and 160
c- 160 and 162
d- 160 and 161

Explicación:Ports 161 and 162 are used by SNMP.

Pregunta 5:
Which kind of values is injected into a connection to the host machine in an
effort to increment the sequence number in a predictable fashion?
a- Bit
b- Null
c- IP
d- Counted

Explicación:Null values are used to increment the sequence numbers of packets


between the victim and the host. The null packets are sent to the host machine in an
effort to prepare for desynchronizing the client.

Pregunta 6:
__________ involves grabbing a copy of a zone file.
a- Zone update
b- Zone transfer
c- Nslookup transfers
d- DNS transfer

Explicación:Zone transfers are used to retrieve a copy of the zone file from a
server and store it in another location.

Pregunta 7:
During a Xmas tree scan what indicates a port is closed?
a- RST
b- SYN
c- ACK
d- No return response

Explicación:An RST indicates the port is closed in many of the TCP scan types. The
RST is sent in response to a connection request and the RST indicates that the port is
not available.

Pregunta 8:
Which of the following would confirm a user named chell in SMTP?
a- expn –u chell
b- expn chell
c- vrfy chell
d- vrfy –u chell

Explicación:vrfy chell, the verify command, is used within SMTP to verify that
the object provided is legitimate.

Pregunta 9:
Which mechanism can be used to influence a targeted individual?
a- Means of dress or appearance
b- Physical controls
c- Training
d- Technological controls

Explicación:Appearance can easily impact the opinion that an individual or a group


has about someone. The other options here are types of countermeasures used to
stop physical attacks.

Pregunta 10:
Phishing can be mitigated through the use of __________.
a- Spam Filtering & Education
b- Anti-malware
c- Spam filtering
d- Antivirus
e- Education
Explicación:Education and spam filtering are tremendously helpful at lessening
the impact of phishing. Pure antivirus and anti-malware typically do not include
this functionality unless they are part of a larger suite.

Pregunta 11:
A __________ is used to represent a password.
a- Hash
b- Rootkit
c- NULL sesión
d- Rainbow table

Explicación:A password hash is commonly used to represent a password in an


encrypted format that is not reversible in locations such as the SAM database.

Pregunta 12:
LDAP is used to perform which function?
a- Query a database
b- Query a directory
c- Query a network
d- Query a file system

Explicación:LDAP is used to query and structure databases; this database could


include a directory service, but it is not necessarily one.

Pregunta 13:
SMTP is used to perform which function?
a- Monitor network equipment
b- Transmit status information
c- Send email messages
d- Transfer files

Explicación:SMTP is primarily intended to transfer email messages from email


servers and clients.

Pregunta 14:
VRFY is used to do which of the following?
a- Expand a mailing list
b- Validate an email server
c- Validate an email address
d- Test a connection

Explicación:VRFY validates an email address in SMTP.

Pregunta 15:
SNMP is used to do which of the following?
a- Transfer files
b- Synchronize clocks
c- Monitor network devices
d- Retrieve mail from a server
Explicación:SNMP is used to monitor and send messages to network devices.

Pregunta 16:
What is the best option for thwarting social-engineering attacks?
a- Physical controls
b- Training
c- Technology
d- Policies

Explicación:Training is the best and most effective method of blunting the impact of
social engineering. Addressing the problem through education can lessen the need for
some countermeasures.

Pregunta 17:
Which of the following is not a Trojan?
a- Subseven
b- BO2K
c- TCPTROJAN
d- LOKI

Explicación:TCPTROJAN is not a Trojan. All the other utilities on this list are
different forms of Trojans.

Pregunta 18:
Network-level hijacking focuses on the mechanics of a connection such as the
manipulation of packet sequencing. What is the main focus of web app session
hijacking?
a- Breaking user logins
b- Traffic redirection
c- Resource DoS
d- Stealing sesión IDs

Explicación:Stealing session IDs is the main objective in web session hijacking.


Session IDs allow the attacker to assume the role of the legitimate client without the
timeconsuming task of brute-forcing user logins or sniffing out authentication
information.

Pregunta 19:
A __________ is a type of offline attack.
a- Birthday attack
b- Rainbow attack
c- Cracking attack
d- Hashing attack

Explicación:A rainbow attack or rainbow table attack is designed to generate the


hashes necessary to perform an offline attack against an extracted hash.

Pregunta 20:
Zombies Inc. is looking for ways to better protect their web servers from
potential DoS attacks. Their web admin proposes the use of a network appliance
that receives all incoming web requests and forwards them to the web server.
He says it will prevent direct customer contact with the server and reduce the
risk of DoS attacks. What appliance is he proposing?
a- IDS
b- Reverse proxy
c- Web proxy
d- Firewall

Explicación:Reverse proxies are implemented to protect the destination resource, not


the client or user. In this scenario, a reverse proxy will field all outside requests,
thereby preventing direct traffic to the web server and reducing the risk of a DoS
attack.

Das könnte Ihnen auch gefallen