Professional Documents
Culture Documents
Questions251260isEC1350iPadVieweriPadViewer
Return
Font
ProtectEye
CloseLight
Questions251-260
Bookmark
Shelf
ReturnList
Questions251.ThistooliswidelyusedforARPPoisoningattack.Namethetool.
A.CainandAble
B.BeatInfector
C.PoisonIvy
D.WebarpInfector
Answer:A
Explanation:
Questions252.BankerFoxisaTrojanthatisdesignedtostealusers'bankingdatarelatedto
certainbankingentities.
WhentheyaccessanywebsiteoftheaffectedbanksthroughthevulnerableFirefox3.5
browser,theTrojanisactivatedandlogstheinformationenteredbytheuser.Allthe
informationenteredinthatwebsitewillbeloggedbytheTrojanandtransmittedtothe
attacker'smachineusingcovertchannel.
BankerFoxdoesnotspreadautomaticallyusingitsownmeans.Itneedsanattackinguser's
interventioninordertoreachtheaffectedcomputer.
Whatisthemostefficientwayanattackerlocatedinremotelocationtoinfectthisbanking
Trojanonavictim'smachine?
http://wap.testsnow.net/3/3553/42240.html
1/6
6/8/2016
Questions251260isEC1350iPadVieweriPadViewer
A.Physicalaccess-theattackercansimplycopyaTrojanhorsetoavictim'sharddiskinfecting
themachineviaFirefoxadd-onextensions
B.Custompackaging-theattackercancreateacustomTrojanhorsethatmimicsthe
appearanceofaprogramthatisuniquetothatparticularcomputer
C.Custompackaging-theattackercancreateacustomTrojanhorsethatmimicsthe
appearanceofaprogramthatisuniquetothatparticularcomputer
D.Custompackaging-theattackercancreateacustomTrojanhorsethatmimicsthe
appearanceofaprogramthatisuniquetothatparticularcomputer
E.Downloadingsoftwarefromawebsite?Anattackercanofferfreesoftware,suchas
sharewareprogramsandpiratedmp3files
Answer:E
Explanation:
Questions253.Inthecontextofpasswordsecurity:asimpledictionaryattackinvolvesloading
adictionaryfile(atextfilefullofdictionarywords)intoacrackingapplicationsuchas
L0phtCrackorJohntheRipper,andrunningitagainstuseraccountslocatedbytheapplication.
Thelargerthewordandwordfragmentselection,themoreeffectivethedictionaryattackis.
Thebruteforcemethodisthemostinclusive-thoughslow.Usually,ittrieseverypossible
letterandnumbercombinationinitsautomatedexploration.Ifyouwouldusebothbruteforce
anddictionarycombinedtogethertohavevariationsofwords,whatwouldyoucallsuchan
attack?
A.FullBlownAttack
B.ThoroughAttack
C.HybridAttack
D.BruteDictAttack
Answer:C
Explanation:
http://wap.testsnow.net/3/3553/42240.html
2/6
6/8/2016
Questions251260isEC1350iPadVieweriPadViewer
Questions254.Youreceiveane-mailwiththefollowingtextmessage.
"Microsoftand
H.todaywarnedallcustomersthatanew,highlydangerousvirushasbeendiscoveredwhich
willeraseallyourfilesatmidnight.Ifthere'safilecalledhidserv.exeonyourcomputer,you
havebeeninfectedandyourcomputerisnowrunningahiddenserverthatallowshackersto
accessyourcomputer.Deletethefileimmediately.Pleasealsopassthismessagetoallyour
friendsandcolleaguesassoonaspossible."
Youlaunchyourantivirussoftwareandscanthesuspiciouslookingfilehidserv.exelocatedin
c:\windowsdirectoryandtheAVcomesoutcleanmeaningthefileisnotinfected.Youview
thefilesignatureandconfirmthatitisalegitimateWindowssystemfile"HumanInterface
DeviceService".
Whatcategoryofvirusisthis?
A.Virushoax
B.SpookyVirus
C.StealthVirus
D.PolymorphicVirus
Answer:A
Explanation:
Questions255.Chooseoneofthefollowingpseudocodestodescribethisstatement:
"Ifwehavewritten200characterstothebuffervariable,thestackshouldstopbecauseit
cannotholdanymoredata."
A.If(I>200)thenexit(1)
B.If(I<200)thenexit(1)
C.If(I<=200)thenexit(1)
D.If(I>=200)thenexit(1)
Answer:D
Explanation:
Questions256.OneoftheeffectiveDoS/DDoScountermeasuresis'Throttling'.Which
statementcorrectlydefinesthisterm?
A.Setuproutersthataccessaserverwithlogictoadjustincomingtraffictolevelsthatwillbe
safefortheservertoprocess
B.Providerscanincreasethebandwidthoncriticalconnectionstopreventthemfromgoing
downintheeventofanattack
C.Replicatingserversthatcanprovideadditionalfailsafeprotection
D.Loadbalanceeachserverinamultiple-serverarchitecture
http://wap.testsnow.net/3/3553/42240.html
3/6
6/8/2016
Questions251260isEC1350iPadVieweriPadViewer
Answer:A
Explanation:
Questions257.AttackersfootprinttargetWebsitesusingGoogleHackingtechniques.Google
hackingisatermthatreferstotheartofcreatingcomplexsearchenginequeries.Itdetects
websitesthatarevulnerabletonumerousexploitsandvulnerabilities.Googleoperatorsare
usedtolocatespecificstringsoftextwithinthesearchresults.
TheconfigurationfilecontainsbothausernameandapasswordforanSQLdatabase.Most
siteswithforumsrunaP
H.messagebase.Thisfilegivesyouthekeystothatforum,includingFULLADMINaccessto
thedatabase.WordPressusesconfig.phpthatstoresthedatabaseUsernameandPassword.
WhichofthebelowGooglesearchstringbringsupsiteswith"config.php"files?
A.Search:indexconfig/php
B.Wordpress:indexconfig.php
C.intitle:index.ofconfig.php
D.Config.php:indexlist
Answer:C
Explanation:
Questions258.WhichofthefollowingtoolwouldbeconsideredasSignatureIntegrityVerifier
(SIV)?
A.Nmap
B.SNORT
C.VirusSCAN
D.Tripwire
Answer:D
Explanation:
Questions259.BobhassetupthreewebserversonWindowsServer2008IIS7.0.Bobhas
followedalltherecommendationsforsecuringtheoperatingsystemandIIS.Theseserversare
goingtorunnumerouse-commercewebsitesthatareprojectedtobringinthousandsof
dollarsaday.Bobisstillconcernedaboutthesecurityoftheseserversbecauseofthepotential
forfinancialloss.Bobhasaskedhiscompany'sfirewalladministratortosetthefirewallto
inspectallincomingtrafficonports80and443toensurethatnomaliciousdataisgettinginto
thenetwork.
Whywillthisnotbepossible?
http://wap.testsnow.net/3/3553/42240.html
4/6
6/8/2016
Questions251260isEC1350iPadVieweriPadViewer
A.Firewallscannotinspecttrafficcomingthroughport443
B.Firewallscanonlyinspectoutboundtraffic
C.Firewallscannotinspecttrafficatall,theycanonlyblockorallowcertainports
D.Firewallscannotinspecttrafficcomingthroughport80
Answer:C
Explanation:
Questions260.WhichofthefollowingstatementcorrectlydefinesICMPFloodAttack?(Select
2answers)
A.BogusEC
H.replypacketsarefloodedonthenetworkspoofingtheIPandMACaddress
B.TheICMPpacketssignalthevictimsystemtoreplyandthecombinationoftrafficsaturates
thebandwidthofthevictim'snetwork
C.EC
H.packetsarefloodedonthenetworksaturatingthebandwidthofthesubnetcausingdenial
ofservice
D.ADDoSICMPfloodattackoccurswhenthezombiessendlargevolumesof
ICMP_ECHO_REPLYpacketstothevictimsystem.
Answer:B,D
Explanation:
Pre
http://wap.testsnow.net/3/3553/42240.html
List
Next
5/6
6/8/2016
Questions251260isEC1350iPadVieweriPadViewer
Home
http://wap.testsnow.net/3/3553/42240.html
PCVersion
MyBook
Free
6/6