Exam 5: Networks and Services
Exam 1: Ethical Hacking and Testing52 Questions
Exam 2: Information Gathering65 Questions
Exam 3: Malicious Code58 Questions
Exam 4: Operating Systems and Applications63 Questions
Exam 5: Networks and Services64 Questions
Select questions type
WPA is vulnerable to brute force if the password is easy and short. What tool attempts this attack?
(Multiple Choice)
4.8/5
(39)
Which of the following protocols are not vulnerable to sniffing due to clear text credentials being sent?
(Multiple Choice)
4.8/5
(36)
Steve is suspicious that someone in his company is attempting to access folders that are unrelated to their job or projects. His first step is to create groups and solidify permissions to prevent this sort of access. He then creates a folder project called "New Netbook OS Project - Do Not Leak to Media" and places fictitious documents inside of it. He then monitors the gadget sites for information and when he sees something, checks what employee accessed that file.
What has Steve done?
(Multiple Choice)
4.8/5
(29)
Arianna wants to implement 802.11b for a series of hotels that her employer won the contract on. Her boss says that one of the customers was concerned that if TCP error checking was part of the configuration, the network would be slower. Arianna pauses, and explains …. ?
(Multiple Choice)
4.7/5
(34)
Dean is repurposing an old Dell Axim PDA (Personal Digital Assistant) as an easy to use walkabout tool for scanning Wifi networks in his area. This PDA is based on windows mobile and he has a compatible CF Card Wifi radio.
What software can he use on this device to meet his objective?
(Multiple Choice)
4.9/5
(35)
Cisco devices use a protocol called CDP (Cisco Discovery Protocol) that allows routers to share information about each other. These messages can sometimes be sniffed. What is the destination MAC address for a CDP message?
(Multiple Choice)
4.9/5
(43)
Jack is worried about the FUD (Fear Uncertainty Doubt) he was heard about wireless networks. He also does not want to learn about WPA2 and how easy it is to implement. He sets forth a policy of no wireless networks allowed period.
What else should he do? (Choose two)
(Multiple Choice)
4.9/5
(37)
Howard wants to control access to his wireless network. Which of the following would not be of assistance to him?
(Multiple Choice)
4.8/5
(39)
Which of the following display filters will only show TCP traffic with the URG, PSH, and FIN flags set?
(Multiple Choice)
4.9/5
(39)
Which of the following tools allows for the easy capture and analysis of data that has been captured during a TCP connection?
(Multiple Choice)
4.9/5
(34)
An attacker is testing out the login page of a website. He notices that after 5 failed attempts he is redirected to a different page. He assumes this logs his IP address, and if this redirect continues, it could lead to being blocked.
How can he avoid this from happening?
(Multiple Choice)
4.7/5
(36)
Mike is trying to recover his password from a site. It asks for his email address. Just then, his cat walks across the keyboard and enters an extra character. He ends up entering into the form mike.portnoy@silverlinings.com' and the return page shows an error was returned from the server.
What is the cause of this on the webserver?
(Multiple Choice)
4.8/5
(39)
What would the following command accomplish?
Windump -nes 0 -w C : \ dump.txt tcp[28]=0x72 or tcp[28]=0x73 or tcp[40]=0x72 or tcp[40]=0x73
(Multiple Choice)
4.8/5
(36)
Quincy runs the L0phcrack tool which has a feature that sniffs SMB passwords and stores them for offline cracking. He tries for hours and picks up nothing.
What could be the reason?
(Multiple Choice)
4.7/5
(49)
Janet is trying to connect to a wireless network but cannot because no SSIDs are being broadcasted. What should she do?
(Multiple Choice)
4.8/5
(47)
You see an email in your box that looks suspicious. It has typos and seems to be preying on a current event that is volitile and has a large audience of passionate people that want to believe its message. Classic social engineering spam. It reads:
…
Stop them from setting up death panels!!!! Only when the government interfeeres does things go terribly wrong. Sign our petition to put an end to this madness and recover your constitutional rights! While you are there, join in the fight by purchasing a t-shirt for ony $29.95. With the slogan, Government is the only disease I have !! Wear it at the next town hall meeting to let them know you are paying attention. http://0x7F2D52DB/stophealthcare.ee
(The address is encrypted to protect your indentity. They are collecting enemy lists we are making sure
You are safe)
…
What is the real IP address of this site?
(Multiple Choice)
4.8/5
(42)
One possible way to defeat a switch is to flood it with spoofed MAC addresses until it fails into "hub mode". Which of the following tools can accomplish this?
(Multiple Choice)
4.8/5
(28)
Ned is testing a web application. He visits a page that seems to have some features that can be customized by the user, but not all of them. He uses a cookie viewer to take a look at how his settings are stored and notices the following name value pairs:
Colorscheme=ocean
Layout=newspaper
Admin=false
He changes the admin variable to true, and reloads the page. This time he can change more items on the page. What is the name of this attack?
(Multiple Choice)
4.9/5
(29)
Showing 41 - 60 of 64
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)