Topic 1: Exam Pool A
Based on the below log, which of the following sentences are true?
Mar 1, 2016, 7:33:28 AM 10.240.250.23 – 54373 10.249.253.15 – 22 tcp_ip
A.
SSH communications are encrypted it’s impossible to know who is the client or the
server
B.
Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the server
C.
Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server
D.
Application is SSH and 10.240.250.23 is the server and 10.249.253.15 is the server
Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server
Log monitoring tools performing behavioral analysis have alerted several suspicious logins
on a Linux server occurring during non-business hours. After further examination of all login
activities, it is noticed that none of the logins have occurred during typical work hours. A
Linux administrator who is investigating this problem realizes the system time on the Linux
server is wrong by more than twelve hours. What protocol used on Linux servers to
synchronize the time has stopped working?
A.
Time Keeper
B.
NTP
C.
PPP
D.
OSPP
NTP
Alice encrypts her data using her public key PK and stores the encrypted data in the cloud.
Which of the following attack scenarios will compromise the privacy of her data?
A.
None of these scenarios compromise the privacy of Alice’s data
B.
Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the
cloud server successfully resists Andrew’s attempt to access the stored data
C.
Hacker Harry breaks into the cloud server and steals the encrypted data
D.
Alice also stores her private key in the cloud, and Harry breaks into the cloud server as
before
Alice also stores her private key in the cloud, and Harry breaks into the cloud server as
before
In the field of cryptanalysis, what is meant by a “rubber-hose" attack?
A.
Attempting to decrypt cipher text by making logical assumptions about the contents of
the original plain text.
B.
Extraction of cryptographic secrets through coercion or torture.
C.
Forcing the targeted key stream through a hardware-accelerated device such as an
ASIC.
D.
A backdoor placed into a cryptographic algorithm by its creator.
Extraction of cryptographic secrets through coercion or torture.
Which of the following Bluetooth hacking techniques does an attacker use to send
messages to users without the recipient’s consent, similar to email spamming?
A.
Bluesmacking
B.
Bluesniffing
C.
Bluesnarfing
D.
Bluejacking
Bluejacking
Page 8 out of 147 Pages |
Previous |