Mid Term Exam-INT-2681

Mid Term Exam-INT-2681

Mid Term Exam-INT-2681-

Question 1

You are on a Windows system. You receive an alert that a file named MyFile.txt.exe had been found. Which of the following could this indicate?

Cloud based IDS

Network based IDS

Host based ID

Compliance based IDS

Question 2

Which of the following operating systems is the most prevalent in the smartphone market?

Android

IOS

Windows

Blackberry

Question 3

Which of the following is an open-source web server technology?

Nginx

Lightspeed web server

Microsoft

Apache web server

Question 4

The Stuxnet worm was discovered in 2010 and was used to gain sensitive information on Iran’s industrial infrastructure. This worm was probably active for about five years before being discovered. During this time, the attacker had access to the target. Which type of attack was Stuxnet?

Logic bomb

Trojan

Virus

APT

Question 5

Which of the following is a nonprofit organization that provides tools and resources for web app security and is made up of software developers, engineers, and freelancers?

Trivial

OWASP

LOGICNet

HaLow

Question 6

Using a fictitious scenario to persuade someone to perform an action or give information they aren’t authorized to share is called:

Impersonation

Footprinting

Pretexting

Preloading

Question 7

A client asking for small deviations from the scope of work is called:

Change order

Rules of Engagement

Scope creep

Security exception

Question 8

You are using a password attack that tests every possible keystroke for each single key in a password until the correct one is found. Which of the following technical password attacks are you using?

Password sniffing

Pass the hash

Keylogger

Brute force

Question 9

What are the two types of Intrusion Detection Systems (IDSs)?

HIS & NIS

HID & NID

HIDS & NIDS

CIDS & WIDS

Mid Term Exam-INT-2681-Question 10

Which of the following attacks utilizes encryption to deny a user access to a device?

Bruteforce attack

Ransomeware attack

Jailbreak attack

DoS

Question 11

Which of the following documents details exactly what can be tested during a penetration test?

Rule of Engagement

Scope of work

Non-disclosure agreement

Master service agreement

Question 12

Which key area in the mobile device security model is supported by device designers requiring passwords, biometrics, and two-factor authentication methods?

Decryption

Access control

Digital signing

Encryption

Question 13

Which of the following is a deviation from standard operating security protocols?

Security exception

Deviation standard

Blacklisting

Whitelisting

Question 14

Miguel is performing a penetration test on a web server. Miguel was given only the server’s IP address and name. Which of the following best describes the type of penetration test Miguel is performing?

Blackbox

External

Internal

Whitebox

Question 15

This type of assessment evaluates deployment and communication between the server and client. It is imperative to develop tight security through user authorization and validation. Open-source and commercial tools are both recommended for this assessment. Which of the following types of vulnerability research is being done?

Buffer overflow

Default settings

Open service

Application flaws

Question 16

Which of the following best describes what FISMA does?

Defines how federal government data, operations, and assets are handled.

Defines the security standards for any organization that handles cardholder information

Implements accounting and disclosure requirements that increase transparency.

Defines standards that ensure medical information is kept safe.

Question 17

Which of the following assessment types can monitor and alert on attacks but cannot stop them?

Active

Passive

Client based

Host based

Question 18

Jaxon, a pentester, is discovering vulnerabilities and design flaws on the Internet that will open an operating system and applications to attack or misuse. Which of the following tasks is he accomplishing?

Vulnerability scanning

Vulnerability research

Vulnerability management

Internet vulnerability

Question 19

In a world where so much private information is stored and transferred digitally, it is essential to proactively discover weaknesses. An ethical hacker’s assessment sheds light on the flaws that can open doors for malicious attackers. Which of the following types of assessments does an ethical hacker complete to expose these weaknesses?

Passive assessment

Internal assessment

Vulnerability assessment

External assessment

Question 20

Michael is performing a penetration test for a hospital. Which federal regulation does Michael need to ensure he follows?

FISMA

SOX

PCI-DSS

HIPAA

Mid Term Exam-INT-2681-Question 21

Karen received a report of all the mobile devices on the network. This report showed the total risk score, summary of revealed vulnerabilities, and remediation suggestions. Which of the following types of software generated this report?

Antivirus scanner

Port scanner

Threat scanner

Vulnerability scanner

Question 22

Which of the following best describes what SOX does?

Defines the security standards for any organization that handles cardholder information.

Defines how federal government data, operations, and assets are handled.

Implements accounting and disclosure requirements that increase transparency.

Defines standards that ensure medical information is kept safe.

Question 23

Which of the following is a benefit of using a proxy when you find that your scanning attempts are being blocked?

This scan will help you to determine whether the firewall is stateful or stateless and whether or not the ports are open.

It filters incoming and outgoing traffic, provides you with anonymity, and shields you from detection.

None of the answers provided are correct.

As long as you are not bombarding the system, the packet segments float by without concern.

Question 24

While performing a penetration test, you captured a few HTTP POST packets using Wireshark. After examining the selected packet, which of the following concerns or recommendations will you include in your report?

None of the answers provided are correct.

The checksum is unverified

Keep-alive connections are being used.

Passwords are being sent in clear text

Question 25

Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on the network?

MAC spoofing

ARP Poisoning

Port mirroring

MAC flooding

Question 26

Information transmitted by the remote host can be captured to expose the application type, application version, and even operating system type and version. Which of the following is a technique hackers use to obtain information about the services running on a target system?

Firewalking

War dialing

Banner grabbing

War driving

Question 27

Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn’t want to sign out of his computer each time he leaves. Which of the following is the best solutions for securing Joe’s workstation?

Apply multifactor authentication on the computer.

Set a strong password, that require special characters.

Configure the screen saver to require a password.

Change the default account names and passwords.

Question 28

Which of the following types of web server attacks is characterized by altering or vandalizing a website’s appearance in an attempt to humiliate, discredit, or annoy the victim?

Cross-site scripting

Website politicking

Website defacement

Website vandalism

Question 29

The following are countermeasures you would take against a web application attack:

  • Secure remote administration and connectivity testing.
  • Perform extensive input validation.
  • Configure the firewall to deny ICMP traffic.
  • Stop data processed by the attacker from being executed.

Which of the following attacks would these countermeasures prevent?

Directory traversal

XSS attacks

XML attacks

DoS attacks

Question 30

Which of the following techniques involves adding random bits of data to a password before it is stored as a hash?

Password sniffing

Pass the hash

Keylogging

Password salting

Mid Term Exam-INT-2681-Question 31

You are analyzing the web applications in your company and have newly discovered vulnerabilities. You want to launch a denial-of-service (DoS) attack against the web server. Which of the following tools would you most likely use?

WebInspect

Burpsuite

Integrity

Metasploit

Question 32

As an ethical hacker, you are looking for a way to organize and prioritize vulnerabilities that were discovered in your work. Which of the following scoring systems could you use?

CISA

CVSS

CVE

NVD

Question 33

Which of the following best describes a honeypot?

A honeypot is a substitute for an IDS or firewall and protects a system.

A honeypot’s purpose is to look like a legitimate network resource.

Virtual honeypots can only simulate one entity on a single device.

All answers provided are correct.

Question 34

Which of the following is a tool for cracking Windows login passwords using rainbow tables?

Snort

Ophcrack

Creamer

Wireshark

Question 35

You have just captured the following packet using Wireshark and the filter shown. Which of the following is the captured password?

watson

St@y0ut!@

watson-p

p@ssw0rd

Question 36

You have found the IP address of a host to be 172.125.68.30. You want to see what other hosts are available on the network. Which of the following nmap commands would you enter to do a ping sweep?

nmap -sS 172.125.68. 1-255

nmap -sU 172.125.68. 1-255

nmap -sM 172.125.68. 1-255

nmap -sn 172.125.68. 1-255

Question 37

A ping sweep is used to scan a range of IP addresses to look for live systems. A ping sweep can also alert a security system, which could result in an alarm being triggered or an attempt being blocked. Which type of scan is being used?

stem scan

Port scan

Network scan

Decoy scan

Question 38

Which of the following best describes a feature of symmetric encryption?

Does not work well for bulk encryption of less sensitive data.

Uses only one algorithm type.

Uses only one key to encrypt and decrypt

Does not require the exchange of the shared secret key.

Question 39

You are executing an attack in order to simulate an outside attack. Which type of penetration test are you performing?

Black hat

White box

White hat

Black box

Question 40

A penetration tester is trying to extract employee information during the reconnaissance phase. What kinds of data is the tester collecting about the employees?

Intellectual property, critical business functions, and management hierarchy

Geographical information, entry control systems, employee routines, and vendor traffic

Contact names, phone numbers, email addresses, fax numbers, and addresses

Operating systems, applications, security policies, and network mapping

Question 41

Firewalls, whether hardware or software, are only as effective as their __________?

Organization

Configuration

Manufacturer

Location

Question 42

Which of the following defines the security standards for any organization that handles cardholder information for any type of payment card?

SOX

PCI-DSS

PCY-DSS

HIPAA

Answer Preview-Mid Term Exam-INT-2681

Mid Term Exam-INT-2681-

 

$10.00

Posted

in

by

Tags: