Topic 1: Exam Pool A
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a
message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
A.
SHA-2
B.
SHA-3
C.
SHA-1
D.
SHA-0
SHA-1
Trinity needs to scan all hosts on a /16 network for TCP port 445 only. What is the fastest
way she can accomplish this with Nmap? Stealth is not a concern.
A.
nmap -sn -sF 10.1.0.0/16 445
B.
nmap -p 445 -n -T4 –open 10.1.0.0/16
C.
nmap -s 445 -sU -T5 10.1.0.0/16
D.
nmap -p 445 –max -Pn 10.1.0.0/16
nmap -p 445 -n -T4 –open 10.1.0.0/16
You are working as a Security Analyst in a company XYZ that owns the whole subnet
range of 23.0.0.0/8 and 192.168.0.0/8.
While monitoring the data, you find a high number of outbound connections. You see that
IP’s owned by XYZ (Internal) and private IP’s are communicating to a Single Public IP.
Therefore, the Internal IP’s are sending data to the Public IP.
After further analysis, you find out that this Public IP is a blacklisted IP, and the internal
communicating devices are compromised.
What kind of attack does the above scenario depict?
A.
Botnet Attack
B.
Spear Phishing Attack
C.
Advanced Persistent Threats
D.
Rootkit Attack
Botnet Attack
A hacker is an intelligent individual with excellent computer skills and the ability to explore a
computer's software and hardware without the owner’s permission. Their intention can
either be to simply gain knowledge or to illegally make changes. Which of the following
class of hacker refers to an individual who works both offensively and defensively at various times?
A.
Suicide Hacker
B.
Black Hat
C.
White Hat
D.
Gray Hat
Gray Hat
Which of the following steps for risk assessment methodology refers to vulnerability
identification?
A.
Determines if any flaws exist in systems, policies, or procedures
B.
Assigns values to risk probabilities; Impact values.
C.
Determines risk probability that vulnerability will be exploited (High. Medium, Low)
D.
Identifies sources of harm to an IT system. (Natural, Human. Environmental)
Determines risk probability that vulnerability will be exploited (High. Medium, Low)
Page 9 out of 147 Pages |
Previous |