PrepAway - Latest Free Exam Questions & Answers

Tag: network administrator

What no-cost setting could Jacob make to stop pop-ups on these computers?

Jacob is the network administrator for Richardson Electric, a heating and air conditioning company based out of Wichita. Jacob is responsible for the entire corporate network, including its security. Jacob has recently been receivingnumerous calls from users stating that they receive pop-ups all the time. Theseusers’ computers are all running Windows XP SP2. Jacob checks their Internet Explorer settings and the pop-up blocker is on for every machine. Jacob decidesto install a couple of other free browsers that have pop-up blockers, and the computers still receive numerous pop-ups. Jacob downloads free spyware and adwareremoval software to scan these computers. The scans return no results, and thecomputers are still getting numerous pop-ups. Jacob does not have any money inhis budget to buy any commercial products to stop this issue. What no-cost setting could Jacob make to stop pop-ups on these computers?

What UDP port should Henry listen onthat is used by the Palm OS to find sensitive information?

Henry is the network administrator for a large advertising firm in Chicago.As well as ensuring overall network health, Henry is responsible for performingsecurity audits, vulnerability assessments and penetration tests to check for network security. Henry has been asked to travel to one of the company’s branchoffices in Taylor Texas to perform a security audit. Right away, Henry noticeshow many mobile devices that branch office utilizes including PDA’s, Blackberries, and laptops. To prove a point, Henry wants to show the IT manager at that branch office how insecure some of those mobile devices are. In particular, he wants to point out the sensitive information that Palm devices can pass when usingHotSync to synch itself with a computer. What UDP port should Henry listen onthat is used by the Palm OS to find sensitive information?

Whathas Giles discovered on Tommy’s computer?

Giles is the network administrator for his company, a graphics design company based in Dallas. Most of the network is comprised of Windows servers and workstations, except for some designers that prefer to use MACs. These MAC users are running on the MAC OS X operating system. These MAC users also utilize iChatto talk between each other. Tommy, one of these MAC users, calls Giles and saysthat his computer is running very slow. Giles then gets more calls from the other MAC users saying they are receiving instant messages from Tommy even when hesays he is not on his computer. Giles immediately unplugs Tommy’s computer fromthe network to take a closer look. He opens iChat on Tommy’s computer and it says that it sent a file called latestpics.tgz to all the other MAC users. Tommy says he never sent those files. Giles also sees that many of the computer’s applications appear to be altered. The path where the files should be has an altered file and the original application is stored in the file’s resource fork. Whathas Giles discovered on Tommy’s computer?

Under what right does this investigator have to ask for the encryption algorithms and keys?

Nathan is the senior network administrator for Undulating Innovations, a software development company in Los Angeles. Nathan’s company typically develops secure email programs for state and local agencies. These programs allow these agencies to send and receive encrypted email using proprietary encryption and signing methods. An employee at one of the state agencies has been arrested on suspicion of leaking sensitive government information to third world countries for profit. When the US federal government steps in, they seize the employee’s computer and attempt to read email he sent but are not able to because of the encryption software he used. Nathan receives a call from an investigator working forthe CIA on this particular case. The investigator tells Nathan that his companyhas to give up the encryption algorithms and keys to the government so they can read the email sent by the accused state employee. Under what right does this investigator have to ask for the encryption algorithms and keys?

If Heather is caught by the federal government, what law could she be prosecuted under?

Heather is a hackivist working for Green Peace International.She has broken into numerous oil and energy companies and exposed their confidential data to the public. Normally, Heather uses a combination of social engineering and DoS techniques to gain access to the companies’ networks.Heather has made over 50 fakes ID cards and access badges to gain unauthorized access to companies to gain information as well. If Heather is caught by the federal government, what law could she be prosecuted under?

Which of the following command Mason should run in Knoppix to permanently erase the data?

Mason is the network administrator of ata Machine Systems, Inc. He has been pushed aside in promotions due to office politics. He wants to take revenge on his oss, Matthew Smith. Being a disgruntled employee, Mason sneaks into Matthew’s office one night and boots his boss’s computer with the Knoppix CD-ROM and intends to erase the contents of his oss’s hard disk including the partition table without leaving any trace of his action. He intends to make the hard disk data unrecoverable even to forensics team.
Which of the following command Mason should run in Knoppix to permanently erase the data?

What tool would work best for Daryl's needs?

Daryl is a network administrator working for Dayton Technologies. Since Daryl’s background is in web application development, many of the programs and applications his company uses are web- based. Daryl sets up a simple forms-based logon screen for all the applications he creates, so they are secure.
The problem Daryl is having, is that his users are forgetting their passwords quite often and sometimes he does not have the time to get into his applications and change the passwords for them. Daryl wants a tool or program that can monitor web-based passwords and notify him when a password has been changed so he can use that tool whenever a user calls him and he can give them their password right then.
What tool would work best for Daryl’s needs?

You want to retrieve the Cisco configuration from the router. How would you proceed?

The network administrator at Spears Technology, Inc has configured the default gateway Cisco router’s access-list as below:
Current configuration : 1206 bytes
!
version 12.3
!
hostname Victim
!
enable secret 5 $1$h2iz$DHYpcqURF0APD2aDuA.YX0
!
interface Ethernet0/0
p address dhcp
p nat outside
alf-duplex
!
interface Ethernet0/1
p address 192.168.1.1 255.255.255.0
p nat inside
alf-duplex
!
router rip
etwork 192.168.1.0
!
ip nat inside source list 102 interface Ethernet0/0 overload
no ip http server
ip classless
!
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 102 permit ip any any
!
snmp-server community public RO
snmp-server community private RW 1
snmp-server enable traps tty
!
line con 0
ogging synchronous
ogin
line aux 0
line vty 0 4
assword secret
ogin
!
!
end
You are hired to conduct security testing on their network. You successfully brute-force the SNMP community string using a SNMP crack tool. The access-list configured at the router prevents you from establishing a successful connection.
You want to retrieve the Cisco configuration from the router. How would you proceed?


Page 1 of 212