Topic 1: Exam Pool A
You need a tool that can do network intrusion prevention and intrusion detection, function
as a network sniffer, and record network activity, what tool would you most likely select?
A.
Nmap
B.
Cain & Abel
C.
Nessus
D.
Snort
Snort
Which of the following attacks exploits web age vulnerabilities that allow an attacker to
force an unsuspecting user’s browser to send malicious requests they did not intend?
A.
Command Injection Attacks
B.
File Injection Attack
C.
Cross-Site Request Forgery (CSRF)
D.
Hidden Field Manipulation Attack
Cross-Site Request Forgery (CSRF)
DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which
security feature on switches leverages the DHCP snooping database to help prevent manin-
the-middle attacks?
A.
Port security
B.
A Layer 2 Attack Prevention Protocol (LAPP)
C.
Dynamic ARP inspection (DAI)
D.
Spanning tree
Dynamic ARP inspection (DAI)
The collection of potentially actionable, overt, and publicly available information is known
as
A.
Open-source intelligence
B.
Human intelligence
C.
Social intelligence
D.
Real intelligence
Open-source intelligence
Some clients of TPNQM SA were redirected to a malicious site when they tried to access
the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were
victims of DNS Cache Poisoning.
What should Bob recommend to deal with such a threat?
A.
The use of security agents in clients’ computers
B.
The use of DNSSEC
C.
The use of double-factor authentication
D.
Client awareness
The use of DNSSEC
Page 11 out of 147 Pages |
Previous |