1. What is the best way to defend against network sniffing?
A) Registering all machines MAC address in a Centralized Database B) Using encryption protocols to secure network communications C) Using static IP Address D) Restricting physical access to server rooms hosting Critical Servers
2. An NMAP scan of a server shows that port 69 is open. What risk could this pose?
A) Weak SSL Version B) Unauthenticated Access C) Web Portal Data Leak D) Cleartext Login
3. Which of the following viruses is usually targeted at Microsoft Office products?
A) Multipart Virus B) Polymorphic Virus C) Stealth Virus D) Macro Virus
4. Define a -collision attack in cryptography?
A) Collision attacks try to get the public key B) Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key C) Collision attacks try to find two inputs producing the same hash D) Collision attacks try to break the hash into three parts to get the plaintext value
5. Which of the following provide the most information about the system-s security posture?
A) Port Scanning, Service Identification, Banner Grabbing B) Phishing, Spamming, Sending Trojans C) Social Engineering, Tailgating, Company Site Browsing D) Wardriving, Social Engineering, Warchalking
1. Right Answer: B Explanation: A way to protect your network traffic from being sniffed is to use encryption such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS). Encryption does not prevent packet sniffers from seeing source and destination information, but it does encrypt the data packet-s payload so that all that the sniffers see is encrypted gibberish.
2. Right Answer: A Explanation: Trivial File Transfer Protocol (TFTP) runs on port 69, which is not encrypted or authenticate The first and basic rich associated to this port is unauthenticated access.
3. Right Answer: C Explanation: Port Scanning, Service Identification, and Banner Gathering provide a security professional with most information about the system-s security posture.
4. Right Answer: A Explanation: A collision attack is an attempt to find two input strings of hash function that produces the same hash result.
5. Right Answer: D Explanation: Port Scanning, Service Identification, and Banner Gathering provide a security professional with most information about the system-s security posture.
Leave a comment