What sort of vulnerability assessment approach starts by building an inventory of protocols
found on the machine?
A.
Inference-based Assessment
B.
Service-based Assessment Solutions
C.
Product-based Assessment Solutions
D.
Tree-based Assessment
Inference-based Assessment
Reference:http://www.businessweek.com/adsections/2005/pdf/wp_mva.pdf(page 26, first
para on the page)
Which of the following statement holds true for TCP Operation?
A.
Port numbers are used to know which application the receiving host should pass the
data to
B.
Sequence numbers are used to track the number of packets lost in transmission
C.
Flow control shows the trend of a transmitting host overflowing the buffers in the
receiving host
D.
Data transfer begins even before the connection is established
Data transfer begins even before the connection is established
You work as an IT security auditor hired by a law firm in Boston. You have been assigned
the responsibility to audit the client for security risks. When assessing the risk to the clients
network, what step should you take first?
A.
Analyzing, categorizing and prioritizing resources
B.
Evaluating the existing perimeter and internal security
C.
Checking fora written security policy
D.
Analyzing the use of existing management and control architecture
Checking fora written security policy
John, the penetration tester in a pen test firm, was asked to find whether NTP services are
opened on the target network (10.0.0.7) using Nmap tool.
Which one of the following Nmap commands will he use to findit?
A.
nmap -sU –p 389 10.0.0.7
B.
nmap -sU –p 123 10.0.0.7
C.
nmap -sU –p 161 10.0.0.7
D.
nmap -sU –p 135 10.0.0.7
nmap -sU –p 123 10.0.0.7
Passwords protect computer resources and files from unauthorized access by malicious
users. Using passwords is the most capableand effective way to protect information and to
increase the security level of a company.
Password cracking is the process of recovering passwords from data that have been stored
in or transmitted by a computer system to gain unauthorized access to a system.
Which of the following password cracking attacks tries every combination of characters
until the password is broken?
A.
Brute-force attack
B.
Rule-based attack
C.
Hybrid attack
D.
Dictionary attack
Brute-force attack
Reference:http://books.google.com.pk/books?id=m2qZNW4dcyIC&pg=PA237&lpg=PA237
&dq=password+cracking+attacks+tries+every+combination+of+characters+until+the+pass
word+is+broken&source=bl&ots=RKEUUo6LYj&sig=MPEfFBEpoO0yvOwMxYCoPQuqM5
g&hl=en&sa=X&ei=ZdwdVJm3CoXSaPXsgPgM&ved=0CCEQ6AEwAQ#v=onepage&q=pa
ssword-cracking-attacks-tries-every-combination-of-characters%
20until-the-password-is-broken&f=false
Page 6 out of 40 Pages |
Previous |