q6
q6
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------------------
---------------------
2.Email is transmitted across the Internet using the Simple Mail Transport
Protocol. SMTP does not encrypt email, leaving the information in the message
vulnerable to being read by an unauthorized person. SMTP can upgrade a connection
between two mail servers to use TLS. Email transmitted by SMTP over TLS is
encrypted. What is the name of the command used by SMTP to transmit email over TLS?
A. OPPORTUNISTICTLS
B. UPGRADETLS
C. FORCETLS
D. STARTTLS
Correct Answer: D
4.Which mode of IPSec should you use to assure security and confidentiality of data
within the same LAN?
A. ESP transport mode
B. ESP confidential
C. AH permiscuous
D. AH Tunnel mode
Correct Answer: A
5.An attacker, using a rogue wireless AP, performed an MITM attack and injected an
HTML code to embed a malicious applet in all HTTP connections. When users accessed
any page, the applet ran and exploited many machines. Which one of the following
tools the hacker probably used to inject HTML code?
A. Wireshark
B. Ettercap
C. Aircrack-ng
D. Tcpdump
Correct Answer: B
6.What is the known plaintext attack used against DES which gives the result that
encrypting plaintext with one DES key followed by encrypting it with a second DES
key is no more secure than using a single key?
A. Man-in-the-middle attack
B. Meet-in-the-middle attack
C. Replay attack
D. Traffic analysis attack
Correct Answer: B
7.Which Intrusion Detection System is the best applicable for large environments
where critical assets on the network need extra scrutiny and is ideal for observing
sensitive network segments?
A. Honeypots
B. Firewalls
C. Network-based intrusion detection system (NIDS)
D. Host-based intrusion detection system (HIDS)
Correct Answer: C
9.You are attempting to run an Nmap port scan on a web server. Which of the
following commands would result in a scan of common ports with the least amount of
noise in order to evade IDS?
A. nmap -A – Pn
B. nmap -sP -p-65535 -T5
C. nmap -sT -O -T0
D. nmap -A –host-timeout 99 -T1
Correct Answer: C
13.Which of the following is the BEST way to defend against network sniffing?
A. Using encryption protocols to secure network communications
B. Register all machines MAC Address in a Centralized Database
C. Use Static IP Address
D. Restrict Physical Access to Server Rooms hosting Critical Servers
Correct Answer: A
15.A regional bank hires your company to perform a security assessment on their
network after a recent data breach. The attacker was able to steal financial data
from the bank by compromising only a single server. Based on this information, what
should be one of your key recommendations to the bank?
A. Place a front-end web server in a demilitarized zone that only handles external
web traffic
B. Require all employees to change their anti-virus program with a new one
C. Move the financial data to another server on the same IP subnet
D. Issue new certificates to the web servers from the root certificate authority
Correct Answer: A
16.During a black-box pen test you attempt to pass IRC traffic over port 80/TCP
from a compromised web enabled host. The traffic gets blocked; however, outbound
HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic?
A. Circuit
B. Stateful
C. Application
Correct Answer: B
17.Which of the following tools performs comprehensive tests against web servers,
including dangerous files and CGIs?
A. Nikto
B. John the Ripper
C. Dsniff
D. Snort
Correct Answer: A
19.If a tester is attempting to ping a target that exists but receives no response
or a response that states the destination is unreachable, ICMP may be disabled and
the network may be using TCP. Which other option could the tester use to get a
response from a host using TCP?
A. Traceroute
B. Hping
C. TCP ping
D. Broadcast ping
Correct Answer: B
20.Which of the following is the structure designed to verify and authenticate the
identity of individuals within the enterprise taking part in a data exchange?
A. SOA
B. biometrics
C. single sign on
D. PKI
Correct Answer: D
21.A new wireless client is configured to join a 802.11 network. This client uses
the same hardware and software as many of the other clients on the network. The
client can see the network, but cannot connect. A wireless packet sniffer shows
that the Wireless Access Point (WAP) is not responding to the association requests
being sent by the wireless client. What is a possible source of this problem?
A. The WAP does not recognize the client’s MAC address
B. The client cannot see the SSID of the wireless network
C. Client is configured for the wrong channel
D. The wireless client is not configured to use DHCP
Correct Answer: A
22.If you want to only scan fewer ports than the default scan using Nmap tool,
which option would you use?
A. -r
B. -F
C. -P
D. -sP
Correct Answer: B
23.User A is writing a sensitive email message to user B outside the local network.
User A has chosen to use PKI to secure his message and ensure only user B can read
the sensitive email. At what layer of the OSI layer does the encryption and
decryption of the message take place?
A. Application
B. Transport
C. Session
D. Presentation
Correct Answer: D
25.Which of the following is the best attack vector for Joe and Bob to follow if
they are both ethical hackers and have gained access to a folder when Joe has
several encrypted files from the folder, and Bob has found one of them unencrypted?
Known plain text---------------
Cipher text only
Replay
Chosen cipher text
Explanation:-----------------------------------------------------------------------
-----------------------------------------------------------------
The hacker has both plain-text and cipher-text communications in a known plain-text
attack; the plain-text copies are scanned for repeating patterns, which are then
compared to the cipher-text versions. This may be used to decipher the key over
time and with effort.
26.What is the primary consideration for this case that an organization has decided
upon AES with a 256-bit key to secure data exchange?
AES is a weak cypher.
It uses a shared key for encryption.---------------
The key size makes data exchange bulky and complex.
AES is slow.
Explanation:-----------------------------------------------------------------------
-----------------------------------------------------------------
Because AES is a symmetric algorithm, the same key is utilized for both encryption
and decryption.
Before any data exchange, the organization must devise a safe method of
transmitting the key to both parties.
28.Which of the following is not true regarding RC4 if RC4 is a simple, fast
encryption cipher?
RC4 uses block encryption.---------------
RC4 can be used for web encryption.
RC4 is a symmetric encryption cipher.
RC4 can be used for file encryption.
Explanation:-----------------------------------------------------------------------
-----------------------------------------------------------------
RC4 is a basic, fast, and symmetric stream cipher. It can be used for nearly
everything an encryption cipher may be used for (you can even discover it in WEP).
29.Using variable block sizes (from 32 to 128 bits) is which symmetric algorithm in
the following?
MD5
3DES
RC---------------
DES
Explanation:-----------------------------------------------------------------------
-----------------------------------------------------------------
Variable block sizes (from 32 to 128 bits) is used by Rivest Cipher (RC)
31.A symmetric encryption method that converts a fixedlength amount of plain text
into an encrypted version of the same length is which of the following?
Block---------------
Stream
Bit
Hash
Explanation:-----------------------------------------------------------------------
-----------------------------------------------------------------
Block encryption transforms a fixed-length plain text block into an encrypted block
of the same length.
32.Which of the following tests is often faster and less expensive, but is more
vulnerable to false reporting and contract violations?
Automatic---------------
Internal
External
Manual
Explanation:-----------------------------------------------------------------------
-----------------------------------------------------------------
Automatic testing makes use of a tool suite and is often faster than a
comprehensive manual test.
However, it is susceptible to false negatives and false positives and frequently
exceeds the scope boundary.
34.A good choice for an automated penetration test would be which of the following?
(select all that apply.)
nmap
CANVAS---------------
Core Impact---------------
Netcat
Explanation:-----------------------------------------------------------------------
-----------------------------------------------------------------
Both Core Impact and CANVAS are automated, all-in-one test tool suites that can run
a test for a customer.
Other tools, like as Nessus, Retina, SAINT, and Sara, may be used in concert with
them to detect vulnerabilities.
36.Which algorithm is Dan most likely to crack in the case that He intercepted
several encrypted files from an organization during a penetration test. They were
encrypted with different algorithms?
DES---------------
RSA
3DES
AES
40.Which of the following best describes MAC spoofing in the case that you have
just discovered that a hacker is trying to penetrate your network using MAC
spoofing?
Driving around in a car and searching for wireless networks that allow MAC
addresses to be captured
The process of sending many Ethernet frames, each containing different source MAC
addresses, to a switch
Changing a hacker's network card to match a legitimate address being used on a
network---------------
Configuring a network card to run in promiscuous mode, allowing MAC addresses to be
captured
42.Which of the following tools would Allen most likely select if he who is the
network administrator, needs a tool that can do network intrusion prevention and
intrusion detection, capture packets, and monitor information?
Nessus
Snort---------------
Nmap
Cain & Abel
43.A penetration tester discovers a vulnerable application and is able to steal the
URL hyperlink session ID of a website. The session ID can be intercepted by the
penetration tester; when the vulnerable application transmits the URL hyperlink to
the website, the session IDs are embedded in the hyperlink. The penetration tester
employs which of the following types of session hijacking countermeasures?
UDP session hijacking
Session fixation attack---------------
TCP/IP session hijacking
Man-in-the-middle attack
44.Which of the following host discovery techniques must Andrew use to perform the
given task if he is an Ethical Hacker who was assigned the task of discovering all
the active devices hidden by a restrictive firewall in the IPv4 range in a given
target network?
UDP scan
arp ping scan---------------
TCP Maimon scan
ACK flag probe scan
47.John wants to send Marie an email that includes sensitive information, and he
does not trust the network that he is connected to. Marie gives him the idea of
using PGP. What should John do to communicate correctly using this type of
encryption?
A. Use his own private key to encrypt the message.
B. Use his own public key to encrypt the message.
C. Use Marie’s private key to encrypt the message.
D. Use Marie’s public key to encrypt the message.
Answer : D
48.You are attempting to run an Nmap port scan on a web server. Which of the
following commands would result in a scan of common ports with the least amount of
noise in order to evade IDS?
A. nmap -A - Pn
B. nmap -sP -p-65535 -T5
C. nmap -sT -O -T0
D. nmap -A --host-timeout 99 -T1
Answer : C
51.Becky has been hired by a client from Dubai to perform a penetration test
against one of their remote offices. Working from her location in Columbus, Ohio,
Becky runs her usual reconnaissance scans to obtain basic information about their
network. When analyzing the results of her Whois search, Becky notices that the IP
was allocated to a location in Le Havre, France. Which regional Internet registry
should Becky go to for detailed information?
A. ARIN
B. LACNIC
C. APNIC
D. RIPE
Answer : A
57.Gilbert, a web developer, uses a centralized web API to reduce complexity and
increase the integrity of updating and changing data. For this purpose, he uses a
web service that uses HTTP methods such as PUT, POST, GET, and DELETE and can
improve the overall performance, visibility, scalability, reliability, and
portability of an application. What is the type of web-service API mentioned in the
above scenario?
A. RESTful API
B. JSON-RPC
C. SOAP API
D. REST API
Answer : A
58.To create a botnet, the attacker can use several techniques to scan vulnerable
machines. The attacker first collects information about a large number of
vulnerable machines to create a list. Subsequently, they infect the machines. The
list is divided by assigning half of the list to the newly compromised machines.
The scanning process runs simultaneously. This technique ensures the spreading and
installation of malicious code in little time. Which technique is discussed here?
A. Subnet scanning technique
B. Permutation scanning technique
C. Hit-list scanning technique.
D. Topological scanning technique
Answer : D
59.Sophia is a shopping enthusiast who spends significant time searching for trendy
outfits online. Clark, an attacker, noticed her activities several times and sent a
fake email containing a deceptive page link to her social media page displaying
all-new and trendy outfits. In excitement, Sophia clicked on the malicious link and
logged in to that page using her valid credentials. Which of the following tools is
employed by Clark to create the spoofed email?
A. Evilginx
B. Slowloris
C. PLCinject
D. PyLoris
Answer : A
64.You are a penetration tester and are about to perform a scan on a specific
server. The agreement that you signed with the client contains the following
specific condition for the scan: “The attacker must scan every port on the server
several times using a set of spoofed source IP addresses.” Suppose that you are
using Nmap to perform this scan. What flag will you use to satisfy this
requirement?
A. The -g flag
B. The -A flag
C. The -f flag
D. The -D flag
Answer : D
66.Widespread fraud at Enron, WorldCom, and Tyco led to the creation of a law that
was designed to improve the accuracy and accountability of corporate disclosures.
It covers accounting firms and third parties that provide financial services to
some organizations and came into effect in 2002. This law is known by what acronym?
A. SOX
B. FedRAMP
C. HIPAA
D. PCI DSS
Answer : A
70.Which of the following allows attackers to draw a map or outline the target
organization's network infrastructure to know about the actual environment that
they are going to hack?
A. Vulnerability analysis
B. Malware analysis
C. Scanning networks
D. Enumeration
Answer : C
71.Susan, a software developer, wants her web API to update other applications with
the latest information. For this purpose, she uses a user-defined HTTP callback or
push APIs that are raised based on trigger events; when invoked, this feature
supplies data to other applications so that users can instantly receive real-time
information. Which of the following techniques is employed by Susan?
A. Web shells
B. Webhooks
C. REST API
D. SOAP API
Answer : B
72.Which IOS jailbreaking technique patches the kernel during the device boot so
that it becomes jailbroken after each successive reboot?
A. Tethered jailbreaking
B. Semi-untethered jailbreaking
C. Semi-tethered jailbreaking
D. Untethered jailbreaking
Answer : D
75.What firewall evasion scanning technique make use of a zombie system that has
low network activity as well as its fragment identification numbers?
A. Packet fragmentation scanning
B. Spoof source address scanning
C. Decoy scanning
D. Idle scanning
Answer : D
79.Which of the following is the pathway the threat agent takes to exploit
vulnerability?
A threat vector-------------------
A threat agent
A race condition
A Hazard
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
Threat vectors are the routes or the ways that malicious attacks may adopt to pass
through the defences of the system and ultimately infect the network.
Email or Phishing attacks and malicious attachments target the email threat vector.
83.Which of the following layer in Open Systems Interconnection (OSI) model closest
to the end-user and manages the communication needs of the application?
Physical Layer
Data Link Layer
Application Layer-------------------
Presentation Layer
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
An application layer is an abstraction layer that specifies the shared
communications (transmission and reception) protocols and interface types/methods
used by hosts or computer in a communications network.
It is nearest to the end-user and manages the communication (transmission and
reception) needs of the application.
84.It is a local network topology in which the infrastructure nodes (i.e. bridges,
switches, and other infrastructure devices) being connected directly, dynamically
and non-hierarchically to other nodes as many as possible is the definition for
which of the following?
Bus Network
Mesh Network-------------------
Hybrid Network
Star Network
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
A mesh network which is also known as meshnet is a local network topology in which
the infrastructure nodes (i.e. bridges, hub, switches, and other devices) connect
directly, dynamically and non-hierarchically to as many other nodes, computers, or
other hosts as possible and communicate with one another to route data precisely
and effectively from/to clients.
85.it’s a communication channel (a single network cable) that allows the
communication between multiple computers is the definition of Which of the
following topology?
Star Network
Bus Network-------------------
Mesh Network
Ring Network
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
In a Local Area Network (LAN), a bus topology can be defined as a topology in which
all the nodes, hosts or computers are connected to a single cable.
The cable to which the nodes, hosts or computers connect is called a “backbone”.
If this backbone is broken, the communication in the entire segment fails, it means
that no host is able to communicate.
86.It is a network topology in which each node is connected to exactly two other
nodes, forming a single continuous pathway for signals through each node is the
definition for which of the following?
Star Network
Ring Network-------------------
Bus Network
Mesh Network
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
A ring network is defined as a network topology in which each node, computer or
simply host connects to exactly two other nodes, computer or hosts forming a single
continuous pathway for transmitting and reception of signals through each node i.e.
a ring.
Data passes from node to node, with each node or computer along the way receiving
and transmitting every packet.
87.In the IP header, Which of the following is a 4-bit field and indicates IP
version?
Type of Service
Version-------------------
Total Length
Flags
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
The version field in the IP header indicates that the packet under consideration
includes the version of the IP.
This field shows a value of 4 when IPv4 is configured.
The header length is defined as the length of the header and in 32-bit words, it
has the values between 20 bytes to 60 bytes.
88.In Open Systems Interconnection (OSI) model HyperText Transfer Protocol (HTTP)
is a protocol of which of the following layer?
Application Layer-------------------
Physical Layer
Data Link Layer
Presentation Layer
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
HyperText Transfer Protocol is an application layer protocol which is developed
within the framework of the Internet protocol suite for viewing the web pages.
It develops the relations between the client and the server for resources (pages,
etc.).
89.Which of the following are a 32-bit number that masks an IP address, and divides
the IP address into network address and host address?
Application layer
The router
Subnet Mask-------------------
Broadcasting
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
A Subnet mask is a 32-bit number that masks or hide an IP address, and also divides
the IP address into two parts, one of it is the network address and the other is
the host address. Subnet Mask is created by changing network bits to all “1”s and
changing host bits to all “0”s.
90.Which of the following is a network whose nodes are more than 10 or so miles
apart?
Metropolitan Area Network (MAN)
Wide Area Network (WAN)-------------------
Virtual Local Area Network (VLAN)
Local Area Network (LAN)
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
A Wide Area Network is defined as a network whose nodes (computers or hosts) are
more than 10 or so miles apart from each other.
Any Internet service provider on backbone of the internet would have a WAN.
Additionally, businesses like banks may have WANs where they have network
connections that make connections between their offices located at different
places.
91.Which of the following protocols work well with streaming video and audio?
TCP
UDP-------------------
FTP
HTTP
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
UDP protocol is best in Streaming video and audio and TCP protocol doesn’t work
well for streaming video and audio. One biggest reason is that with UDP, it depends
on the application to do any type of reordering of messages (packets or datagram),
as required.
If a datagram (the PDU for UDP) receives out of order with streaming audio or
video, the application at the receiver side will just destroy it.
92.What wireless discovery option tool identifies poor coverage locations within
the WLAN network, detects interference causes, finds any rogue access points in the
network and is compatible with 802.11a, b, and g?
Kismet at www.kismetwireless.net
WIGLE at www.wigle.net
NetTumbler at www.nettumbler.com
NetStumbler at www.netstumbler.com-------------------
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
The NetStumbler application is a Windows-based tool used to discover WLAN networks
running on 802.11 a/b/g standards.
It helps detect other networks that may cause interference to your network, and it
can also find out poor coverage areas in the WLAN network and helps administrators
set up the network the way it is intended to be.
95.Cloud security is important on the side of the provider, as well as that of the
subscriber. What cloud security tool provides instant visibility and continuous
protection for servers in any combination of data centers, private clouds, and
public clouds?
CloudHalo
CloudSecurity
CloudInspect
CloudPassage Halo-------------------
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
CloudPassage Halo is a unified cloud security platform that automates cloud
computing security controls and compliance across servers, containers, and in any
public, private, hybrid, and multi-cloud environments.
97.Bluetooth is used for connecting devices, usually mobile phones, wirelessly over
a short distance. Since we keep a lot of personal information in our Bluetooth-
enabled devices, it is susceptible to hacking that could pay huge dividends. What
is this type of Bluetooth attack, wherein attackers steal data from a mobile device
due to an open connection, such as remaining in discovery mode?
Bluesnarfing-------------------
Bluesniffing
Bluesmacking
Blueprinting
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
Bluesnarfing allows hackers to gain access to data stored on a Bluetooth enabled
phone without alerting the phone’s user of the connection made to the device.
Some of the information that can be accessed includes the phonebook, images, and
calendar.
98.The CIA Triad is a widely used information security model that can guide an
organization’s efforts and policies aimed at keeping its data secure. What is this
part of the CIA Triad, which preserves the authenticity of data over its whole
transit by making sure unauthorized parties are not able to revise it?
Integrity-------------------
Availability
Accuracy
Confidentiality
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
Integrity protects information from unauthorized tampering while the data is at
rest or in transit.
In other words, integrity measures secure the data sent from the sender until it
arrives at the recipient with no alteration.
102.The CIA Triad is a widely used information security model that can guide an
organization’s efforts and policies aimed at keeping its data secure. What is this
part of the CIA Triad, which preserves the authenticity of data over its whole
transit by making sure unauthorized parties are not able to revise it?
Availability
Accuracy
Integrity-------------------
Confidentiality
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
Integrity protects information from unauthorized tampering while the data is at
rest or in transit.
In other words, integrity measures secure the data sent from the sender until it
arrives at the recipient with no alteration.
106.The Data Encryption Standard (DES) is a block cipher uses which of the
following key algorithm?
Symmetric key-------------------
The Data Encryption Standard (DES) does not use any encryption key
Asymmetric key
Both Symmetric and Asymmetric key
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
The Data Encryption Standard (DES) can be explained as follows:-
(A) It is a block cypher that uses symmetric key
(B) This is a long-deprecated encryption standard, but it raises an important
element about cryptography
(C) One of the problems with DES is that it only uses a 56-bit key.
109.In OpenVAS, You can see the number of network vulnerability tests (NVTs) that
have been enabled in each config. How NVTs are categorized for organizational
purposes?
NVTs are not categorized
NVTs are categorized into divisions
NVTs are categorized into families-------------------
NVTs are categorized into sectors
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
in OpenVAS, there are total of eight scan configs categorized by default.
In OpenVAS, You can see the number of network vulnerability tests (NVTs) that have
been enabled in each config.
NVTs are categorized into families for organizational purposes.
111.Security Analysis Tool for Auditing Networks (SATAN) was written primarily in
which of the following language?
C ++
JAVA
Perl-------------------
HTML
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
Security Analysis Tool for Auditing Networks is abbreviated as SATAN is the very
first scanner which is used to identify vulnerability in the systems.
This is developed by two great computer security analyst Dan Farmer and Wietse
Venema.
This program was written in the language called Perl and SATAN is used as a web
interface.
112.Which of the following technique used to determining systems that are alive?
Port Scan
The vulnerability scanner
Ping Sweeps-------------------
Port identifier
Explanation:-----------------------------------------------------------------------
----------------------------------------------------------------------
Ping Sweep is defined as a technique used to recognize if the hosts or computer
systems are alive in the networks using their IP addresses.
A ping sweep is described as when sending ping messages to every computer system or
hosts on the network, thus the “sweep” part.