Which of the following statements about the traceroute utility are true?
A. It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote host.
B. It records the time taken for a round trip for each packet at each router.
C. It is an online tool that performs polymorphic shell code attacks.
D. It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection Systems.
You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?
A. Antivirus log
B. IDS log
C. System log
D. Firewall log
Mark works as a Web Developer for XYZ CORP. He is developing a Web site for the company. He wants to use frames in the Web site.
Which of the following is an HTML tag used to create frames?
A.
B.
C.
D.
John works as a Network Auditor for XYZ CORP. The company has a Windows-based network. John wants to conduct risk analysis for the company.
Which of the following can be the purpose of this analysis? (Choose three)
A. To ensure absolute safety during the audit
B. To analyze exposure to risk in order to support better decision-making and proper management of those risks
C. To try to quantify the possible impact or loss of a threat
D. To assist the auditor in identifying the risks and threats
Which of the following statements is true about residual risks?
A. It is the probabilistic risk after implementing all security measures.
B. It can be considered as an indicator of threats coupled with vulnerability.
C. It is a weakness or lack of safeguard that can be exploited by a threat.
D. It is the probabilistic risk before implementing all security measures.
Which of the following types of attack is described in the statement below?
"It is a technique employed to compromise the security of network switches. In this attack, a switch is flooded with packets, each containing different source MAC addresses. The intention is to consume the limited memory set aside in the switch to store the MAC address-to-physical port translation table."
A. Man-in-the-middle
B. Blind spoofing
C. Dictionary
D. MAC flooding
Which of the following statements about URL rewriting are true?
A. If cookies are supported by the browser, URL rewriting will return the URL unchanged.
B. The request.encodeRedirectURL() method is used to add a session id info to the URL and send the request to another URL.
C. The request.encodeURL() method is used to add a session id info to the URL.
D. URL rewriting is used in cases where cookies are not supported by the browser.
Which of the following services are provided by the proxy servers?
A. Intrusion detection
B. Logging
C. Hiding network resources
D. Caching
Which of the following key combinations in the vi editor is used to copy the current line?
A. dk
B. yy
C. d$
D. dl
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He successfully performs a brute force attack on the We-are-secure server. Now, he suggests some countermeasures to avoid such brute force attacks on the We-are-secure server.
Which of the following are countermeasures against a brute force attack?
A. The site should use CAPTCHA after a specific number of failed login attempts.
B. The site should increase the encryption key length of the password.
C. The site should restrict the number of login attempts to only three times.
D. The site should force its users to change their passwords from time to time.