PrepAway - Latest Free Exam Questions & Answers

Author: admin

What can Jacob do to prevent USB flash drives from working on these publicly available computers?

Jacob is the systems administrator for Haverson Incorporated, a food processing company in Boston. Jacob is responsible for all equipment on the network aswell as network security. After attending the CEH class and passing the CEH te st, Jacob wants to make some changes on the network to ensure network security.Since there are three company computers in a publicly accessible area, he wantsto lock those machines down as much as possible. Jacob wants to make sure thatno one can use USB flash drives on those computers; while still allowing USB mice and keyboards to work. What can Jacob do to prevent USB flash drives from working on these publicly available computers? (Select 2)

What technique is Leonard trying to employ here to stop SPAM?

Leonard is a systems administrator who has been tasked by his supervisor toslow down or lessen the amount of SPAM their company receives on a regular basis. SPAM being sent to company email addresses has become a large problem withinthe last year for them. Leonard starts by adding SPAM prevention software at the perimeter of the network. He then builds a black list, white list, turns on MX callbacks, and uses heuristics to stop the incoming SPAM. While these techniques help some, they do not prevent much of the SPAM from coming in. Leonard decides to use a technique where his mail server responds very slowly to outside connected mail servers by using multi-line SMTP responses. By responding slowly to SMTP connections, he hopes that SPAMMERS will see this and move on to easier a nd faster targets. What technique is Leonard trying to employ here to stop SPAM?

What technology allows Steven to disable the RFID tags once they are no longer needed?

Steven is the senior network administrator for Onkton Incorporated, an oil well drilling company in Oklahoma City. Steven and his team of IT technicians are in charge of keeping inventory for the entire company; including computers, software, and oil well equipment. To keep track of everything, Steven has decidedto use RFID tags on their entire inventory so they can be scanned with either awireless scanner or a handheld scanner. These RFID tags hold as much information as possible about the equipment they are attached to. When Steven purchasedthese tags, he made sure they were as state of the art as possible. One featurehe really liked was the ability to disable RFID tags if necessary. This comesin very handy when the company actually sells oil drilling equipment to other companies. All Steven has to do is disable the RFID tag on the sold equipment andit cannot give up any information that was previously stored on it. What technology allows Steven to disable the RFID tags once they are no longer needed?

What port should Vickiblock at the firewall so no external connections can be made directly to the VoIP phones

Vicki is the IT manager for her company, an online retail business in Seattle. Vicki was recently given budget approval by the CIO to purchase 100 VoIP phones and all the VoIP networking equipment needed to make a complete VoIP implementation. Vicki and her employees install all the phones and set up the serversneeded to run the new system. After about three months of setup, everything hasbeen completed and the system is finally stable. Because she is not very familiar with VoIP security, she attends a VoIP security seminar which she finds very informative. One interesting piece of information she learns of is that most VoIP phones are installed with an imbedded OS called VxWorks. This, she finds out, is also what the VoIP phone manufacturer installed on all her company’s new VoIP phones. Vicki also learns that there is a default remote debugger on all these phones that listens on a specific port in case a remote administrator needs to do some troubleshooting. Vicki sees this as a large security problem. Instead of going to each and every new phone to turn off this feature, she decides toblock the necessary port on the firewall to save time. What port should Vickiblock at the firewall so no external connections can be made directly to the VoIP phones?

From these errors, what can Blake deduce about these ports?

Blake is an IT security consultant, specializing in PBX and VoIP implementation testing. Blake has been recently hired on my Thwarting Enterprises, a brokerage firm in New York City. The company heard through contacts that Blake was t he best in the business as far as examining and securing VoIP network implementations. About a year ago, Thwarting Enterprises installed a Cisco VoIP system throughout their office to replace the older PBX system. They have now brought Blake in to test its security, or lack thereof. Blake first begins his testing byfinding network devices on the network that might be used for VoIP. Blake pref ers to use UDP scanning because of its quickness. Blake finds a target on the network that looks promising and begins to perform a scan against it by sending p ackets with empty UDP headers to each port. Almost all of the ports respond with the error of “ICMP port unreachable”. From these errors, what can Blake deduce about these ports?

What type of attack has William just demonstrated to his boss?

William is the senior security analyst for Cuthbert & Associates, a large law firm in Miami. William is responsible for ensuring complete network security.
William’s boss, the IT director, is trying to convince the owners of the firm to purchase new Blackberry devices and new Bluetooth enabled laptops. William h
as been telling his boss that using Bluetooth devices like that is not secure. William’s boss doesn’t believe that Bluetooth devices are a security risk, so he
asks for a demonstration. William obliges his boss by setting up an attack with his personal laptop and his boss’ Bluetooth enabled phone. William uses Logic
al Link Control and Adaptation Layer Protocol ( L2CAP) to send oversized packets to his boss’ phone. This attack overloads the phone and William is able to do
whatever he wants to with the device now. What type of attack has William just demonstrated to his boss?

What type of attack is Richard demonstrating here at the conference?

Richard is an IT security expert currently making presentations in Las Vegasat a logical security conference. Richard’s specialty is in Bluetooth technology and different ways to take advantage of its vulnerabilities. Richard is using one of his Bluetooth enabled cell phones and a Bluetooth enabled laptop to make a demonstration on how to steal information from a wireless device through a Bluetooth connection. Richard shows how to connect to the OBEX Push target and how to perform an OBEX GET request to pull the address book and calendar off thecell phone. What type of attack is Richard demonstrating here at the conference?

What UDP port should Henry listen onthat is used by the Palm OS to find sensitive information?

Henry is the network administrator for a large advertising firm in Chicago.As well as ensuring overall network health, Henry is responsible for performingsecurity audits, vulnerability assessments and penetration tests to check for network security. Henry has been asked to travel to one of the company’s branchoffices in Taylor Texas to perform a security audit. Right away, Henry noticeshow many mobile devices that branch office utilizes including PDA’s, Blackberries, and laptops. To prove a point, Henry wants to show the IT manager at that branch office how insecure some of those mobile devices are. In particular, he wants to point out the sensitive information that Palm devices can pass when usingHotSync to synch itself with a computer. What UDP port should Henry listen onthat is used by the Palm OS to find sensitive information?

What type of attack has Cindy used to gain access tothe network through the mobile devices?

Cindy is a certified ethical hacker working on contract as an IT consultantfor Dewdrop Enterprises, a computer manufacturing company based in Dallas. Dewdrop has many sales people that travel all over the state using Blackberry devices and laptops. These mobile devices are the company’s main concern as far as network security. About a year ago, one of the company laptops was stolen from asales person and sensitive company information was stolen from it. Because of this, the company has hired on Cindy to ensure that all mobile devices used by employees are secure. Since many of the employees are now using new laptops withWindows Vista, Cindy has configured Bitlocker on those devices for hard disk encryption. Cindy then uses the BlackBerry Attack Toolkit along with BBProxy to check for vulnerabilities on the blackberry devices. As it turns out, these devices are vulnerable and she is able to gain access to the corporate network throug h the Blackberry devices. What type of attack has Cindy used to gain access tothe network through the mobile devices?

What other command could Michael use to attempt to freeze up the router?

Michael is an IT security consultant currently working under contract for alarge state agency in New York. Michael has been given permission to perform any tests necessary against the agency’s network. The agency’s network has come under many DoS attacks in recent months, so the agency’s IT team has tried to take precautions to prevent any future DoS attacks. To test this, Michael attemptsto gain unauthorized access or even overload one of the agency’s Cisco routers that is at IP address 192.168.254.97. Michael first creates a telnet session over port 23 to the router. He uses a random username and tries to input a very large password to see if that freezes up the router. This seems to have no affect on the router yet. What other command could Michael use to attempt to freeze up the router?


Page 116 of 231« First...102030...114115116117118...130140150...Last »