Topic 1: Volume A
What does ICMP (type 11, code 0) denote?
A.
Source Quench
B.
Destination Unreachable
C.
Time Exceeded
D.
Unknown Type
Time Exceeded
If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business, they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they will be in the organization.
How would you prevent such type of attacks?
A.
It is impossible to block these attacks
B.
Hire the people through third-party job agencies who will vet them for you
C.
Conduct thorough background checks before you engage them
D.
Investigate their social networking profiles
Conduct thorough background checks before you engage them
You receive an e-mail with the following text message.
"Microsoft and HP today warned all customers that a new, highly dangerous virus has been
discovered which will erase all your files at midnight. If there's a file called hidserv.exe on
your computer, you have been infected and your computer is now running a hidden server
that allows hackers to access your computer. Delete the file immediately. Please also pass
this message to all your friends and colleagues as soon as possible."
You launch your antivirus software and scan the suspicious looking file hidserv.exe located
in c:\windows directory and the AV comes out clean meaning the file is not infected. You
view the file signature and confirm that it is a legitimate Windows system file "Human
Interface Device Service".
What category of virus is this?
A.
Virus hoax
B.
Spooky Virus
C.
Stealth Virus
D.
Polymorphic Virus
Virus hoax
What is War Dialing?
A.
War dialing involves the use of a program in conjunction with a modem to penetrate the
modem/PBX-based systems
B.
War dialing is a vulnerability scanning technique that penetrates Firewalls
C.
It is a social engineering technique that uses Phone calls to trick victims
D.
Involves IDS Scanning Fragments to bypass Internet filters and stateful Firewalls
War dialing involves the use of a program in conjunction with a modem to penetrate the
modem/PBX-based systems
Peter extracts the SID list from Windows 2008 Server machine using the hacking tool
"SIDExtracter". Here is the output of the SIDs:
From the above list identify the user account with System Administrator privileges?
A.
John
B.
Rebecca
C.
Sheela
D.
Shawn
E.
Somia
F.
Chang
G.
Micah
Chang
Page 4 out of 175 Pages |
Previous |