text
stringlengths 0
108
|
---|
C. Unified threat management appliance |
D. Stateful firewall |
11. What is the purpose of a security policy? |
A. Providing high-level guidance on the role of security |
B. Providing specific direction to security workers |
C. Increasing the bottom line of a company |
D. Aligning standards and practices |
12. What has been done to the following string? %3Cscript%3Ealert(‘wubble’);%3C/ |
script%3E |
A. Base64 encoding |
B. URL encoding |
C. Encryption |
D. Cryptographic hashing |
13. What would you get from running the command dig ns domain.com? |
A. Mail exchanger records for domain.com |
B. Name server records for domain.com |
C. Caching name server for domain.com |
D. IP address for the hostname ns |
14. What technique would you ideally use to get all of the hostnames associated with a |
domain? |
A. DNS query |
B. Zone copy |
C. Zone transfer |
D. Recursive request |
15. If you were to notice operating system commands inside a DNS request while looking at a |
packet capture, what might you be looking at? |
A. Tunneling attack |
B. DNS amplification |
C. DNS recursion |
D. XML entity injection |
16. What would be the purpose of running a ping sweep? |
A. You want to identify responsive hosts without a port scan. |
B. You want to use something that is light on network traffic. |
C. You want to use a protocol that may be allowed through the firewall. |
D. All of the above. |
17. How many functions are specified by NIST’s cybersecurity framework? |
A. 0 |
B. 3 |
C. 5 |
D. 4 |
18. What would be one reason not to write malware in Python? |
A. Python interpreter is slow. |
B. Python interpreter may not be available. |
C. There is inadequate library support. |
D. Python is a hard language to learn. |
19. If you saw the following command line, what would you be capturing? |
tcpdump -i eth2 host 192.168.10.5 |
A. Traffic just from 192.168.10.5 |
B. Traffic to and from 192.168.10.5 |
C. Traffic just to 192.168.10.5 |
D. All traffic other than from 192.168.86.5 |
20. What is Diffie-Hellman used for? |
A. Key management |
B. Key isolation |
C. Key exchange |
D. Key revocation |
21. Which social engineering principle may allow a phony call from the help desk to |
be effective? |
A. Social proof |
B. Imitation |
C. Scarcity |
D. Authority |
22. How do you authenticate with SNMPv1? |
A. Username/password |
B. Hash |
C. Public string |
D. Community string |
23. What is the process Java programs identify themselves to if they are sharing procedures |
over the network? |
A. RMI registry |
B. RMI mapper |
C. RMI database |
D. RMI process |
24. What do we call an ARP response without a corresponding ARP request? |
A. Is-at response |
B. Who-has ARP |
C. Gratuitous ARP |
D. IP response |
25. What are the three times that are typically stored as part of file metadata? |
A. Moves, adds, changes |
B. Modified, accessed, deleted |
C. Moved, accessed, changed |
D. Modified, accessed, created |
26. Which of these is a reason to use an exploit against a local vulnerability? |
A. Pivoting |
B. Log manipulation |
C. Privilege escalation |
D. Password collection |
27. What principle is used to demonstrate that a signed message came from the owner of the |
key that signed it? |
A. Non-repudiation |
B. Non-verifiability |
C. Integrity |
D. Authority |
28. What is a viable approach to protecting against tailgaiting? |
A. Biometrics |
B. Badge access |
C. Phone verification |
D. Man traps |
29. Why is bluesnarfing potentially more dangerous than bluejacking? |