Topic 1: Exam Pool A
What is the least important information when you analyze a public IP address in a security
alert?
A.
ARP
B.
Whois
C.
DNS
D.
Geolocation
ARP
When conducting a penetration test, it is crucial to use all means to get all available
information about the target network. One of the ways to do that is by sniffing the network.
Which of the following cannot be performed by the passive network sniffing?
A.
Identifying operating systems, services, protocols and devices
B.
Modifying and replaying captured network traffic
C.
Collecting unencrypted information about usernames and passwords
D.
Capturing a network traffic for further analysis
Modifying and replaying captured network traffic
How is the public key distributed in an orderly, controlled fashion so that the users can be
sure of the sender’s identity?
A.
Hash value
B.
Private key
C.
Digital signature
D.
Digital certificate
Digital certificate
Which protocol is used for setting up secure channels between two devices, typically in
VPNs?
A.
PPP
B.
IPSEC
C.
PEM
D.
SET
IPSEC
Darius is analysing IDS logs. During the investigation, he noticed that there was nothing
suspicious found and an alert was triggered on normal web application traffic. He can mark
this alert as:
A.
False-Negative
B.
False-Positive
C.
True-Positive
D.
False-Signature
False-Negative
Page 4 out of 147 Pages |
Previous |