Beruflich Dokumente
Kultur Dokumente
a. Message repudiation means an user can validate which mail server or servers a message was
passed through
b. Message repudiation means an user can claim damages for a mail message that damaged their
reputation
c. Message repudiation means a recipient can be sure that a message was sent from a particular
person
d. Message repudiation means a recipient can be sure that a message was sent from a certain host
e. Message repudiation means a sender can claim they did not actually send a particular message
2. How does traceroute map the route that a packet travels from point A to point B?
a. It uses TCP Timestamp packet that will elicit a time exceeded in transit message
b. It uses a protocol that will be rejected at the gateways on its way to its destination
c. It manipulates the values of TTL parameter packet to elicit a time exceeded in transit message
d. It manipulates flags within packets to force gateways into generating error messages
3. Snort has been used to capture packets on the network. On studying the packets, the
SysAdmin finds it to be abnormal. If you were the SysAdmin, why would you find this
abnormal?
(Note: The candidate is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP
connection concepts and the ability to read packet signatures from sniff dump)
c. The attacker wants to avoid creating a sub-carrier connection that is not normally valid
d. The packets were created by a tool and not from a standard TCP/IP stack
a. Enumeration
b. Scanning
c. System Hackiing
d. Social Engineering
e. Denial of Service
5. While performing a ping weep of a subnet you receive an ICMP Type 3/Code 13 for all the
pings sent out. What is the most likely cause behind this response?
6. Jessica would like to perform a reliable scan against a remote target. She is not
concerned about being stealth at this point. Which of the following scans would be the
most accurate and reliable?
a. A half scan
b. A UDP scan
d. A FIN scan
7. What is Form Scalpel used for?
8. In an attempt to secure his Wireless network, Jason turns off broadcasting of the SSID.
He concludes that since his AP requires the client computer to have the proper SSID, it
would prevent others from connecting to the Wireless network. Unfortunately
unauthorized users are still connecting to his Wireless network. Why do you think this is
possible?
9. Which of the following is one of the key features found in a worm but not seen in a
Virus?
10. If you perform a port scan with a TCP ACK packet, what should an Open port return?
a. RST
b. No Reply
c. SYN/ACK
d. FIN
11. You are attempting to map out the firewall policy for an organization. You discover your
target system is one hop beyond the firewall. Using hping2 tool, you send SYN packets with
the exact TTL of the target system starting at port 1 and going up to port 1024. What is this
process called?
a. Footprinting
b. Firewalking
c. Enumeration
d. Idle Scanning
12. The Programmers on your team are analyzing the free open source software being used
to run FTP services on a server. They notice that there is an excessive number of fgets()
and gets() on the source code. These C/C++ functions do not check bounds. What kind of
attack is this program susceptible to?
a. Buffer Overflows
b. Denial of Service
c. Shatter Attack
d. CrashTin Attack
Answers
1. Ans: E
2. Ans: c
3. Ans: b
4. Ans: b
5. Ans: c
6. Ans: c
7. Ans: a
8. Ans: c
9. Ans: b
10. Ans: a
11. Ans: b
12. Ans: a
2. Which of the following choices is a benefit of outsourcing your e-commerce site design
3. Which of the following choices is an area of liability of concern to the electronic publisher?
4. Which of the following times is the best time for performing a test evaluation of your e-
commerce site?
After initial development to make sure that the site is meeting your goals.
Once your site has been in production for a month, so that customers have time to give feedback.
Once the site is nearly ready for production.
During the storyboard process.
5. Luke noticed that his server restarted at 4AM yesterday morning which was a Sunday (non-
working day). Would he suspect that it was a hacking attempt or hacking success? Why?
UDP port 53
UDP Port 23
TCP Port 53
TCP Port 23
7. You have installed a vulnerability scanner on your system, yet it has still been compromised
by an illicit logon. What is the cause of your problem?
8. Which of the following tools is used to detect and announce that a system file has been
changed?
Checksum Analysis
MD5
Tripwire
A changed INODE
9. Which of the following choices can be the cause of information leakage, potentially allowing
further intrusion upon a network?
IP services
Active ports
Modem banks
Routers and Switches
10. Which of the following e-business solutions should be recommended to a customer who is
interesting in collecting, manipulating and analyzing data from many different sources and
platforms?
e-Commerce
Web Self -Service
Business Intelligence
Messaging and Collaboration
11. Wheel Widgets, an automotive assembly plant, is experiencing problems with inventory
that are resulting in cost overruns. They would like to develop a "just-in-time" parts delivery
system. Which of the following e-business solutions should be proposed?
e-Commerce
Business Intelligence
Supply Chain Management
Secure Way Host Integration and Web Self-Service
Answers
1. Answer C is correct. Portal sites, such as Yahoo!, deliver the messages of many different companies.
2. Answer D is correct. Outsourcing your e-commerce solution provides ease of implementation and
administration.
4. Answer C is correct. The best time to perform a site evaluation is when you are close to the end of
development, but not yet in production.
5. Answer D is correct.Many virus and sniffer programs require that the computer reboot to complete
the infestation.
8. Answer C is correct. Tripwire detects and announces when a file has been changed.
9. Answer D is correct. Routers and switches can be the cause of information leakage, potentially
allowing further intrusion upon a network.