Q51. What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common? 

A. All are hacking tools developed by the legion of doom 

B. All are tools that can be used not only by hackers, but also security personnel 

C. All are DDOS tools 

D. All are tools that are only effective against Windows 

E. All are tools that are only effective against Linux 

Answer:

Explanation: All are DDOS tools. 


Q52. Jack is conducting a port scan of a target network. He knows that his target network has a web server and that a mail server is up and running. Jack has been sweeping the network but has not been able to get any responses from the remote target. Check all of the following that could be a likely cause of the lack of response? 

A. The host might be down 

B. UDP is filtered by a gateway 

C. ICMP is filtered by a gateway 

D. The TCP window Size does not match 

E. The destination network might be down 

F. The packet TTL value is too low and can’t reach the target 

Answer: ACEF

Explanation: Wrong answers is B and D as sweeping a network uses ICMP 


Q53. Which tool/utility can help you extract the application layer data from each TCP connection from a log file into separate files? 

A. Snort 

B. argus 

C. TCPflow 

D. Tcpdump 

Answer: C

Explanation: Tcpflow is a program that captures data transmitted as part of TCP connections (flows), and stores the data in a way that is convenient for protocol analysis or debugging. A program like 'tcpdump' shows a summary of packets seen on the wire, but usually doesn't store the data that's actually being transmitted. In contrast, tcpflow reconstructs the actual data streams and stores each flow in a separate file for later analysis. 


Q54. In an attempt to secure his 802.11b wireless network, Ulf decides to use a strategic antenna positioning. He places the antenna for the access points near the center of the building. For those access points near the outer edge of the building he uses semi-directional antennas that face towards the building’s center. There is a large parking lot and outlying filed surrounding the building that extends out half a mile around the building. Ulf figures that with this and his placement of antennas, his wireless network will be safe from attack. 

Which of the following statements is true? 

A. With the 300 feet limit of a wireless signal, Ulf’s network is safe. 

B. Wireless signals can be detected from miles away, Ulf’s network is not safe. 

C. Ulf’s network will be safe but only of he doesn’t switch to 802.11a. 

D. Ulf’s network will not be safe until he also enables WEP. 

Answer: D


Q55. Exhibit: 

The following is an entry captured by a network IDS. You are assigned the task of analyzing this entry. You notice the value 0x90, which is the most common NOOP instruction for the Intel processor. You figure that the attacker is attempting a buffer overflow attack. You also notice "/bin/sh" in the ASCII part of the output. As an analyst what would you conclude about the attack? 

A. The buffer overflow attack has been neutralized by the IDS 

B. The attacker is creating a directory on the compromised machine 

C. The attacker is attempting a buffer overflow attack and has succeeded 

D. The attacker is attempting an exploit that launches a command-line shell 

Answer: D

Explanation: This log entry shows a hacker using a buffer overflow to fill the data buffer and trying to insert the execution of /bin/sh into the executable code part of the thread. It is probably an existing exploit that is used, or a directed attack with a custom built buffer overflow with the “payload” that launches the command shell. 


Q56. Bryce the bad boy is purposely sending fragmented ICMP packets to a remote target. The tool size of this ICMP packet once reconstructed is over 65,536 bytes. From the information given, what type of attack is Bryce attempting to perform? 

A. Smurf 

B. Fraggle 

C. SYN Flood 

D. Ping of Death 

Answer: D

Explanation: A ping of death (abbreviated "POD") is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. A ping is normally 64 bytes in size (or 84 bytes when IP header is considered); many computer systems cannot handle a ping larger than the maximum IP packet size, which is 65,535 bytes. Sending a ping of this size can crash the target computer. Traditionally, this bug has been relatively easy to exploit. Generally, sending a 65,536 byte ping packet is illegal according to networking protocol, but a packet of such a size can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can occur, which often causes a system crash. 


Q57. What port number is used by LDAP protocol? 

A. 110 

B. 389 

C. 445 

D. 464 

Answer:

Explanation: Active Directory and Exchange use LDAP via TCP port 389 for clients. 


Q58. What are two things that are possible when scanning UDP ports? (Choose two. 

A. A reset will be returned 

B. An ICMP message will be returned 

C. The four-way handshake will not be completed 

D. An RFC 1294 message will be returned 

E. Nothing 

Answer: BE

Explanation: Closed UDP ports can return an ICMP type 3 code 3 message. No response can mean the port is open or the packet was silently dropped. 


Q59. What does the following command in netcat do? 

nc -l -u -p 55555 < /etc/passwd 

A. logs the incoming connections to /etc/passwd file 

B. loads the /etc/passwd file to the UDP port 55555 

C. grabs the /etc/passwd file when connected to UDP port 55555 

D. deletes the /etc/passwd file when connected to the UDP port 55555 

Answer: C

Explanation: -l forces netcat to listen for incoming connections. 

-u tells netcat to use UDP instead of TCP 

-p 5555 tells netcat to use port 5555 

< /etc/passwd tells netcat to grab the /etc/passwd file when connected to. 


Q60. The SNMP Read-Only Community String is like a password. The string is sent along with each SNMP Get-Request and allows (or denies) access to a device. Most network vendors ship their equipment with a default password of "public". This is the so-called "default public community string". How would you keep intruders from getting sensitive information regarding the network devices using SNMP? (Select 2 answers) 

A. Enable SNMPv3 which encrypts username/password authentication 

B. Use your company name as the public community string replacing the default 'public' 

C. Enable IP filtering to limit access to SNMP device 

D. The default configuration provided by device vendors is highly secure and you don't need to change anything 

Answer: AC