1. A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through anunknown proxy. This type of attack is known as which of the following?
A) Man-in-the-middle B) Shoulder surfing C) Social engineering D) Phishing
2. A technician is running an intensive vulnerability scan to detect which ports are open to exploit. During the scan, several network services are disabled andproduction is affected. Which of the following sources would be used to evaluate which network service was interrupted?
A) Firewall logs B) Syslog C) Network mapping D) NIDS
3. A computer has been infected with a virus and is sending out a beacon to command and control server through an unknown service. Which of the following shoulda security technician implement to drop the traffic going to the command and control server and still be able to identify the infected host through firewall logs?
A) Sinkhole B) Block ports and services C) Patches D) Endpoint security
4. Company A permits visiting business partners from Company B to utilize Ethernet ports available in Company As conference rooms. This access is provided toallow partners the ability to establish VPNs back to Company Bs network. The security architect for Company A wants to ensure partners from Company B are ableto gain direct Internet access from available ports only, while Company A employees can gain access to the Company A internal network from those same ports.Which of the following can be employed to allow this?
A) NAC B) SAML C) MAC D) ACL E) SIEM
5. A malicious user is reviewing the following output:root:~#ping 192.168.1.13764 bytes from 192.168.2.1 icmp_seq=1 ttl=63 time=1.58 ms64 bytes from 192.168.2.1 icmp_seq=2 ttl=63 time=1.45 msroot: ~#Based on the above output, which of the following is the device between the malicious user and the target?
A) Switch B) Proxy C) Access point D) Hub
1. Right Answer: A Explanation:
2. Right Answer: B Explanation:
3. Right Answer: A Explanation: Reference: https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-DNS-Sinkhole/ta-p/58891
Leave a comment