PrepAway - Latest Free Exam Questions & Answers

Tag: security

Why is that when he does not see any of the traffic produced by Firewalk?

John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?

What are these sights called that Theresa has been tasked with taking down?

Theresa is an IT security analyst working for the United Kingdom Internet Crimes Bureau in London. Theresa has been assigned to the software piracy division which focuses on taking down individual and organized groups that distribute copyrighted software illegally. Theresa and her division have been responsible for taking down over 2,000 FTP sites hosting copyrighted software. Theresa’s sup ervisor now wants her to focus on finding and taking down websites that host illegal pirated software. What are these sights called that Theresa has been tasked with taking down?

What type of insider threat would Shayla be considered?

Shayla is an It security consultant, specializing in social engineering andexternal penetration tests. Shayla has been hired on by Treks Avionics, a subcontractor for the Department of Defense. Shayla has been given authority to perform any and all tests necessary to audit the company’s network security. No employees for the company, other than the IT director, know about Shayla’s work shewill be doing. Shayla’s first step is to obtain a list of employees through company website contact pages. Then she befriends a female employee of the company through an online chat website. After meeting with the female employee numerous times, Shayla is able to gain her trust and they become friends. One day, Shayla steals the employee’s access badge and uses it to gain unauthorized accessto the Treks Avionics offices. What type of insider threat would Shayla be considered?

What built-in Windows feature could you have implemented to protect the sensitive information on these laptops

You are the CIO for Avantes Finance International, a global finance companybased in Geneva. You are responsible for network functions and logical securitythroughout the entire corporation. Your company has over 250 servers running Windows Server, 5000 workstations running Windows Vista, and 200 mobile users working from laptops on Windows XP. Last week, 10 of your company’s laptops were stolen from salesmen while at a conference in Amsterdam. These laptops containedproprietary company information. While doing damage assessment on the possiblepublic relations nightmare this may become, a news story leaks about the stolenlaptops and also that sensitive information from those computers was posted toa blog online. What built-in Windows feature could you have implemented to protect the sensitive information on these laptops?

From these errors, what can Blake deduce about these ports?

Blake is an IT security consultant, specializing in PBX and VoIP implementation testing. Blake has been recently hired on my Thwarting Enterprises, a brokerage firm in New York City. The company heard through contacts that Blake was t he best in the business as far as examining and securing VoIP network implementations. About a year ago, Thwarting Enterprises installed a Cisco VoIP system throughout their office to replace the older PBX system. They have now brought Blake in to test its security, or lack thereof. Blake first begins his testing byfinding network devices on the network that might be used for VoIP. Blake pref ers to use UDP scanning because of its quickness. Blake finds a target on the network that looks promising and begins to perform a scan against it by sending p ackets with empty UDP headers to each port. Almost all of the ports respond with the error of “ICMP port unreachable”. From these errors, what can Blake deduce about these ports?

What type of attack has William just demonstrated to his boss?

William is the senior security analyst for Cuthbert & Associates, a large law firm in Miami. William is responsible for ensuring complete network security.
William’s boss, the IT director, is trying to convince the owners of the firm to purchase new Blackberry devices and new Bluetooth enabled laptops. William h
as been telling his boss that using Bluetooth devices like that is not secure. William’s boss doesn’t believe that Bluetooth devices are a security risk, so he
asks for a demonstration. William obliges his boss by setting up an attack with his personal laptop and his boss’ Bluetooth enabled phone. William uses Logic
al Link Control and Adaptation Layer Protocol ( L2CAP) to send oversized packets to his boss’ phone. This attack overloads the phone and William is able to do
whatever he wants to with the device now. What type of attack has William just demonstrated to his boss?

What UDP port should Henry listen onthat is used by the Palm OS to find sensitive information?

Henry is the network administrator for a large advertising firm in Chicago.As well as ensuring overall network health, Henry is responsible for performingsecurity audits, vulnerability assessments and penetration tests to check for network security. Henry has been asked to travel to one of the company’s branchoffices in Taylor Texas to perform a security audit. Right away, Henry noticeshow many mobile devices that branch office utilizes including PDA’s, Blackberries, and laptops. To prove a point, Henry wants to show the IT manager at that branch office how insecure some of those mobile devices are. In particular, he wants to point out the sensitive information that Palm devices can pass when usingHotSync to synch itself with a computer. What UDP port should Henry listen onthat is used by the Palm OS to find sensitive information?

What other command could Michael use to attempt to freeze up the router?

Michael is an IT security consultant currently working under contract for alarge state agency in New York. Michael has been given permission to perform any tests necessary against the agency’s network. The agency’s network has come under many DoS attacks in recent months, so the agency’s IT team has tried to take precautions to prevent any future DoS attacks. To test this, Michael attemptsto gain unauthorized access or even overload one of the agency’s Cisco routers that is at IP address 192.168.254.97. Michael first creates a telnet session over port 23 to the router. He uses a random username and tries to input a very large password to see if that freezes up the router. This seems to have no affect on the router yet. What other command could Michael use to attempt to freeze up the router?

What type of web application testing is Zane primarily focusing on?

Zane is a network security specialist working for Fameton Automotive, a custom car manufacturing company in San Francisco. Zane is responsible for ensuringthat the entire network is as secure as possible. Much of the company’s business is performed online by customers buying parts and entire cars through the company website. To streamline online purchases, the programming department has developed a new web application that will keep track of inventory and check items out online for customers. Since this application will be critical to the company, Zane wants to test it thoroughly for any security vulnerabilities. Zane primarily focuses on checking the time validity of session tokens, length of those tokens, and expiration of session tokens while translating from SSL to non-SSL resources. What type of web application testing is Zane primarily focusing on?

What type of initial analysis has Charlie performed to show the company which areas it needs improvements in?

Charlie is an IT security consultant that owns his own business in Denver.Charlie has recently been hired by Fleishman Robotics, a mechanical engineeringcompany also in Denver. After signing service level agreements and other contract papers, Charlie asks to look over the current company security policies. Based on these policies, Charlie compares the policies against what is actually inplace to secure the company’s network. From this information, Charlie is able to produce a report to give to company executives showing which areas the companyis lacking in. This report then becomes the basis for all of Charlie’s remaini ng tests. What type of initial analysis has Charlie performed to show the company which areas it needs improvements in?


Page 1 of 1012345...10...Last »