1. A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website.During the troubleshooting process, the network administrator notices that the web gateway proxy on the local network has signed all of the certificates on the localmachine.Which of the following describes the type of attack the proxy has been legitimately programmed to perform?
A) Transitive access B) Spoofing C) Replay D) Man-in-the-middle
2. Which of the following represent the reasoning behind careful selection of the timelines and time-of-day boundaries for an authorized penetration test? (SelectTWO).(Select 2answers)
A) To determine frequency of team communication and reporting B) To avoid conflicts with real intrusions that may occur C) To ensure tests have measurable impact to operations D) To mitigate unintended impacts to operations E) To schedule personnel resources required for test activities
3. Nmap scan results on a set of IP addresses returned one or more lines beginning with cpe:/o: followed by a company name, product name, and version. Which ofthe following would this string help an administrator to identify?
A) Running services B) Installed hardware C) Installed software D) Operating system
4. When network administrators observe an increased amount of web traffic without an increased number of financial transactions, the company is MOST likelyexperiencing which of the following attacks?
A) DoS B) ARP cache poisoning C) Phishing D) Bluejacking
5. The new Chief Technology Officer (CTO) is seeking recommendations for network monitoring services for the local intranet. The CTO would like the capability tomonitor all traffic to and from the gateway, as well as the capability to block certain content. Which of the following recommendations would meet the needs of theorganization?
A) Recommend installation of an IPS on both the internal and external interfaces of the gateway router. B) Recommend installation of a firewall on the internal interface and a NIDS on the external interface of the gateway router. C) Recommend installation of an IDS on the internal interface and a firewall on the external interface of the gateway router. D) Recommend setup of IP filtering on both the internal and external interfaces of the gateway router.
Leave a comment