PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following command results in packets that will appear to originate from the system at 10.8.8.8?

Perimeter testing means determining exactly what your firewall blocks and what it allows. To
conduct a good test, you can spoof source IP addresses and source ports. Which of the following
command results in packets that will appear to originate from the system at 10.8.8.8? Such a
packet is useful for determining whether the firewall is allowing random packets in or out of your
network.

The URL may appear like this: https://www.xsecurity-bank.com/creditcard.asp?

The GET method should never be used when sensitive data such as credit card is being sent to a
CGI program. This is because any GET command will appear in the URL, and will be logged by
any servers. For example, let’s say that you’ve entered your credit card information into a form that
uses the GET method. The URL may appear like this:
https://www.xsecurity-bank.com/creditcard.asp?cardnumber=453453433532234
The GET method appends the credit card number to the URL. This means that anyone with
access to a server log will be able to obtain this information. How would you protect from this type
of attack?

How will you defend against hardware keyloggers when using public computers and Internet Kiosks?

Keystroke logging is the action of tracking (or logging) the keys struck on a keyboard, typically in a
covert manner so that the person using the keyboard is unaware that their actions are being
monitored.

How will you defend against hardware keyloggers when using public computers and Internet
Kiosks? (Select 4 answers)

What can Wayne infer from this traffic log?

Wayne is the senior security analyst for his company. Wayne is examining some traffic logs on a
server and came across some inconsistencies. Wayne finds some IP packets from a computer
purporting to be on the internal network. The packets originate from 192.168.12.35 with a TTL of
15. The server replied to this computer and received a response from 192.168.12.35 with a TTL of
21. What can Wayne infer from this traffic log?


Page 130 of 555« First...102030...128129130131132...140150160...Last »