text
stringlengths
0
108
C. Unified threat management appliance
D. Stateful firewall
11. What is the purpose of a security policy?
A. Providing high-level guidance on the role of security
B. Providing specific direction to security workers
C. Increasing the bottom line of a company
D. Aligning standards and practices
12. What has been done to the following string? %3Cscript%3Ealert(‘wubble’);%3C/
script%3E
A. Base64 encoding
B. URL encoding
C. Encryption
D. Cryptographic hashing
13. What would you get from running the command dig ns domain.com?
A. Mail exchanger records for domain.com
B. Name server records for domain.com
C. Caching name server for domain.com
D. IP address for the hostname ns
14. What technique would you ideally use to get all of the hostnames associated with a
domain?
A. DNS query
B. Zone copy
C. Zone transfer
D. Recursive request
15. If you were to notice operating system commands inside a DNS request while looking at a
packet capture, what might you be looking at?
A. Tunneling attack
B. DNS amplification
C. DNS recursion
D. XML entity injection
16. What would be the purpose of running a ping sweep?
A. You want to identify responsive hosts without a port scan.
B. You want to use something that is light on network traffic.
C. You want to use a protocol that may be allowed through the firewall.
D. All of the above.
17. How many functions are specified by NIST’s cybersecurity framework?
A. 0
B. 3
C. 5
D. 4
18. What would be one reason not to write malware in Python?
A. Python interpreter is slow.
B. Python interpreter may not be available.
C. There is inadequate library support.
D. Python is a hard language to learn.
19. If you saw the following command line, what would you be capturing?
tcpdump -i eth2 host 192.168.10.5
A. Traffic just from 192.168.10.5
B. Traffic to and from 192.168.10.5
C. Traffic just to 192.168.10.5
D. All traffic other than from 192.168.86.5
20. What is Diffie-Hellman used for?
A. Key management
B. Key isolation
C. Key exchange
D. Key revocation
21. Which social engineering principle may allow a phony call from the help desk to
be effective?
A. Social proof
B. Imitation
C. Scarcity
D. Authority
22. How do you authenticate with SNMPv1?
A. Username/password
B. Hash
C. Public string
D. Community string
23. What is the process Java programs identify themselves to if they are sharing procedures
over the network?
A. RMI registry
B. RMI mapper
C. RMI database
D. RMI process
24. What do we call an ARP response without a corresponding ARP request?
A. Is-at response
B. Who-has ARP
C. Gratuitous ARP
D. IP response
25. What are the three times that are typically stored as part of file metadata?
A. Moves, adds, changes
B. Modified, accessed, deleted
C. Moved, accessed, changed
D. Modified, accessed, created
26. Which of these is a reason to use an exploit against a local vulnerability?
A. Pivoting
B. Log manipulation
C. Privilege escalation
D. Password collection
27. What principle is used to demonstrate that a signed message came from the owner of the
key that signed it?
A. Non-repudiation
B. Non-verifiability
C. Integrity
D. Authority
28. What is a viable approach to protecting against tailgaiting?
A. Biometrics
B. Badge access
C. Phone verification
D. Man traps
29. Why is bluesnarfing potentially more dangerous than bluejacking?