Q51. Oregon Corp is fighting a litigation suit with Scamster Inc. Oregon has assigned a private investigative agency to go through garbage, recycled paper, and other rubbish at Scamster's office site in order to find relevant information. What would you call this kind of activity? 

A. Garbage Scooping 

B. Dumpster Diving 

C. Scanning 

D. CI Gathering 

Answer: B

Explanation: Dumpster diving is the colloquial name for going through somebody's garbage --which will usually be in dumpsters for large organizations. This is a powerful tactic because it is protected by social taboos. Trash is bad, and once it goes into the trash, something is best forgotten. The reality is that most company trash is fairly clean, and provides a gold mine of information. 


Q52. A majority of attacks come from insiders, people who have direct access to a company's computer system as part of their job function or a business relationship. Who is considered an insider? 

A. The CEO of the company because he has access to all of the computer systems 

B. A government agency since they know the company computer system strengths and weaknesses 

C. Disgruntled employee, customers, suppliers, vendors, business partners, contractors, temps, and consultants 

D. A competitor to the company because they can directly benefit from the publicity generated by making such an attack 

Answer:

Explanation: An insider is anyone who already has an foot inside one way or another. 


Q53. Which type of sniffing technique is generally referred as MiTM attack? 

A. Password Sniffing 

B. ARP Poisoning 

C. Mac Flooding 

D. DHCP Sniffing 

Answer: C


Q54. eter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP enquires over the network. Which of these tools would do the SNMP enumeration he is looking for? 

Select the best answers. 

A. SNMPUtil 

B. SNScan 

C. SNMPScan 

D. Solarwinds IP Network Browser 

E. NMap 

Answer: ABD

Explanations: 

SNMPUtil is a SNMP enumeration utility that is a part of the Windows 2000 resource kit. With SNMPUtil, you can retrieve all sort of valuable information through SNMP. SNScan is a SNMP network scanner by Foundstone. It does SNMP scanning to find open SNMP ports. Solarwinds IP Network Browser is a SNMP enumeration tool with a graphical tree-view of the remote machine's SNMP data. 


Q55. You are trying to compromise a Linux Machine and steal the password hashes for cracking with password brute forcing program. Where is the password file kept is Linux? 

A. /etc/shadow 

B. /etc/passwd 

C. /bin/password 

D. /bin/shadow 

Answer: A

Explanation: /etc/shadow file stores actual password in encrypted format for user’s account with additional properties related to user password i.e. it stores secure user account information. All fields are separated by a colon (:) symbol. It contains one entry per line for each user listed in /etc/passwd file. 

Topic 19, Evading IDS, Firewalls and Honeypots 

459. Exhibit 

Study the log given in the exhibit, 

Precautionary measures to prevent this attack would include writing firewall rules. Of these firewall rules, which among the following would be appropriate? 

A. Disallow UDP 53 in from outside to DNS server 

B. Allow UDP 53 in from DNS server to outside 

C. Disallow TCP 53 in from secondaries or ISP server to DNS server 

D. Block all UDP traffic 

Answer: C

Explanation: According to the exhibit, the question is regarding the DNS Zone Transfer. Since Zone Transfers are done with TCP port 53, you should not allow this connect external to you organization. 


Q56. E-mail scams and mail fraud are regulated by which of the following? 

A. 18 U.S.C. par. 1030 Fraud and Related activity in connection with Computers 

B. 18 U.S.C. par. 1029 Fraud and Related activity in connection with Access Devices 

C. 18 U.S.C. par. 1362 Communication Lines, Stations, or Systems 

D. 18 U.S.C. par. 2510 Wire and Electronic Communications Interception and Interception of Oral Communication 

Answer: A

Explanation: http://www.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00001030----000-.html 


Q57. NSLookup is a good tool to use to gain additional information about a target network. What does the following command accomplish? 

nslookup 

> server <ipaddress> 

> set type =any 

> ls -d <target.com> 

A. Enables DNS spoofing 

B. Loads bogus entries into the DNS table 

C. Verifies zone security 

D. Performs a zone transfer 

E. Resets the DNS cache 

Answer: D

Explanation: If DNS has not been properly secured, the command sequence displayed above will perform a zone transfer. 


Q58. What is the problem with this ASP script (login.asp)? 

<% 

Set objConn = CreateObject("ADODB.Connection") 

objConn.Open Application("WebUsersConnection") 

sSQL="SELECT * FROM Users where Username=? & Request("user") & _ 

"?and Password=? & Request("pwd") & "? 

Set RS = objConn.Execute(sSQL) 

If RS.EOF then Response.Redirect("login.asp?msg=Invalid Login") Else Session.Authorized = True 

Set RS = nothing 

Set objConn = nothing Response.Redirect("mainpage.asp") End If %> 

A. The ASP script is vulnerable to XSS attack 

B. The ASP script is vulnerable to SQL Injection attack 

C. The ASP script is vulnerable to Session Splice attack 

D. The ASP script is vulnerable to Cross Site Scripting attack 

Answer: B


Q59. An Attacker creates a zuckerjournals.com website by copying and mirroring HACKERJOURNALS.COM site to spread the news that Hollywood actor Jason Jenkins died in a car accident. The attacker then submits his fake site for indexing in major search engines. When users search for "Jason Jenkins", attacker's fake site shows up and dupes victims by the fake news. 

This is another great example that some people do not know what URL's are. Real website: Fake website: http://www.zuckerjournals.com 

The website is clearly not WWW.HACKERJOURNALS.COM. It is obvious for many, but unfortunately some people still do not know what an URL is. It's the address that you enter into the address bar at the top your browser and this is clearly not legit site, its www.zuckerjournals.com 

How would you verify if a website is authentic or not? 

A. Visit the site using secure HTTPS protocol and check the SSL certificate for authenticity 

B. Navigate to the site by visiting various blogs and forums for authentic links 

C. Enable Cache on your browser and lookout for error message warning on the screen 

D. Visit the site by clicking on a link from Google search engine 

Answer: D


Q60. How would you prevent session hijacking attacks? 

A. Using biometrics access tokens secures sessions against hijacking 

B. Using non-Internet protocols like http secures sessions against hijacking 

C. Using hardware-based authentication secures sessions against hijacking 

D. Using unpredictable sequence numbers secures sessions against hijacking 

Answer: D

Explanation: Protection of a session needs to focus on the unique session identifier because it is the only thing that distinguishes users. If the session ID is compromised, attackers can impersonate other users on the system. The first thing is to ensure that the sequence of identification numbers issued by the session management system is unpredictable; otherwise, it's trivial to hijack another user's session. Having a large number of possible session IDs (meaning that they should be very long) means that there are a lot more permutations for an attacker to try.