A company's security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?
AAttempts by attackers to access Web sites that trust the Web browser user by stealing the user's authentication credentials.
BAttempts by attackers to access the user and password information stored in the company's SQL database.
CAttempts by attackers to access passwords stored on the user's computer without the user's knowledge.
DAttempts by attackers to determine the user's Web browser usage patterns, including when sites were visited and for how long.
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.
What is the most likely cause?
AThe network devices are not all synchronized.
BProper chain of custody was not observed while collecting the logs.
CThe attacker altered or erased events from the logs.
DThe security breach was a false positive.
A hacker is attempting to see which IP addresses are currently active on a network. Which NMAP switch would the hacker use?
A-sO
B-sP
C-sS
D-sU
You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.
What is the best nmap command you will use?
Anmap -T4 -F 10.10.0.0/24
Bnmap -T4 -r 10.10.1.0/24
Cnmap -T4 -O 10.10.0.0/24
Dnmap -T4 -q 10.10.0.0/24
Which of the following is considered an acceptable option when managing a risk?
AReject the risk.
BDeny the risk.
CMitigate the risk.
DInitiate the risk. C
Which of the following Nmap commands would be used to perform a stack fingerprinting?
ANmap -O -p80 <host(s.>
BNmap -hU -Q<host(s.>
CNmap -sT -p <host(s.>
DNmap -u -o -w2 <host>
ENmap -sS -0p targe
During a penetration test, a tester finds that the web application being analyzed is vulnerable to Cross Site Scripting (XSS). Which of the following conditions must be met to exploit this vulnerability?
AThe web application does not have the secure flag set.
BThe session cookies do not have the HttpOnly flag set.
CThe victim user should not have an endpoint security solution.
DThe victim's browser must have ActiveX technology enabled. B
Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?
ADetective
BPassive
CIntuitive
DReactive B
A circuit level gateway works at which of the following layers of the OSI Model?
ALayer 5 - Application
BLayer 4 – TCP
CLayer 3 – Internet protocol
DLayer 2 – Data link
When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?
AThe key entered is a symmetric key used to encrypt the wireless data.
BThe key entered is a hash that is used to prove the integrity of the wireless data.
CThe key entered is based on the Diffie-Hellman method.
DThe key is an RSA key used to encrypt the wireless data. A
A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?
AIP Security (IPSEC)
BMultipurpose Internet Mail Extensions (MIME)
CPretty Good Privacy (PGP)
DHyper Text Transfer Protocol with Secure Socket Layer (HTTPS) C
Which of the following is a client-server tool utilized to evade firewall inspection?
Atcp-over-dns
Bkismet
Cnikto
Dhping A
Advanced encryption standard is an algorithm used for which of the following?
AData integrity
BKey discovery
CBulk data encryption
DKey recovery C
Which of the following is a common Service Oriented Architecture (SOA) vulnerability?
ACross-site scripting
BSQL injection
CVPath injection
DXML denial of service issues D
If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?
AHping
BTraceroute
CTCP ping
DBroadcast ping A
Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?
AIncident response services to any user, company, government agency, or organization in partnership with the Department of Homeland Security
BMaintenance of the nation’s Internet infrastructure, builds out new Internet infrastructure, and decommissions old Internet infrastructure
CRegistration of critical penetration testing for the Department of Homeland Security and public and private sectors
DMeasurement of key vulnerability assessments on behalf of the Department of Defense (DOD) and State Department, as well as private sectors A
Which of the following is considered the best way to protect Personally Identifiable Information (PII) from Web application vulnerabilities?
AUse cryptographic storage to store all PII
BUse encrypted communications protocols to transmit PII
CUse full disk encryption on all hard drives to protect PII
DUse a security token to log into all Web applications that use PII
When purchasing a biometric system, one of the considerations that should be reviewed is the processing speed. Which of the following best describes what it is meant by processing?
AThe amount of time it takes to convert biometric data into a template on a smart card.
BThe amount of time and resources that are necessary to maintain a biometric system.
CThe amount of time it takes to be either accepted or rejected form when an individual provides Identification and authentication information.
DHow long it takes to setup individual user accounts. C
Which NMAP command combination would let a tester scan every TCP port from a class C network that is blocking ICMP with fingerprinting and service detection?
ANMAP -PN -A -O -sS 192.168.2.0/24
BNMAP -P0 -A -O -p1-65535 192.168.0/24
CNMAP -P0 -A -sT -p0-65535 192.168.0/16
DNMAP -PN -O -sS -p 1-1024 192.168.0/8
A penetration tester is attempting to scan an internal corporate network from the internet without alerting the border sensor. Which is the most efficient technique should the tester consider using?
ASpoofing an IP address
BTunneling scan over SSH
CTunneling over high port numbers
DScanning using fragmented IP packets
The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security control?
APhysical
BProcedural
CTechnical
DCompliance
Which of the following items of a computer system will an anti-virus program scan for viruses?
ABoot Sector
BDeleted Files
CWindows Process List
DPassword Protected Files
Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?
Ahar.txt
BSAM file
Cwwwroot
DRepair file
Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)
B44EFCE164AB921CQAAD3B435B51404EE
You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company's Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion?
AEncrypt the Sales.xls using PGP and e-mail it to your personal gmail account
BPackage the Sales.xls using Trojan wrappers and telnet them back your home computer [1] Steganography techniques
DChange the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account