Zusammenfassung der Ressource
Frage 1
Frage
Which of the following doesn’t define a method of transmitting data that violates a security policy?
Antworten
-
Backdoor channel
-
Session hijacking
-
Covert channel
-
Overt channel
Frage 2
Frage
Which virus type is only executed when a specific condition is met?
Antworten
-
Sparse infector
-
Multipartite
-
Metamorphic
-
Cavity
Frage 3
Frage
Which of the following propagates without human interaction?
Frage 4
Frage
Which of the following don’t use ICMP in the attack? (Choose two.)
Antworten
-
SYN flood
-
Ping of Death
-
Smurf
-
Peer to peer
Frage 5
Frage
Which of the following is not a recommended step in recovering from a malware infection?
Antworten
-
Delete system restore points.
-
Back up the hard drive.
-
Remove the system from the network.
-
Reinstall from original media.
Frage 6
Frage
Which of the following is a recommendation to protect against session hijacking? (Choose two.)
Antworten
-
Use only nonroutable protocols.
-
Use unpredictable sequence numbers.
-
Use a file verification application, such as Tripwire.
-
Use a good password policy.
-
Implement ICMP throughout the environment.
Frage 7
Frage
Which of the following attacks an already-authenticated connection?
Antworten
-
Smurf
-
Denial of service
-
Session hijacking
-
Phishing
Frage 8
Frage
How does Tripwire (and programs like it) help against Trojan attacks?
Antworten
-
Tripwire is an AV application that quarantines and removes malware immediately.
-
Tripwire is an AV application that quarantines and removes malware after a scan.
-
Tripwire is a file-integrity-checking application that rejects malware packets intended for the kernel.
-
Tripwire is a file-integrity-checking application that notifies you when a system file has been altered, potentially indicating malware.
Frage 9
Frage
Which of the following DoS categories consume all available bandwidth for the system or service?
Frage 10
Frage
During a TCP data exchange, the client has offered a sequence number of 100, and the server has offered 500. During acknowledgments, the packet shows 101 and 501, respectively, as the agreed-upon sequence numbers. With a window size of 5, which sequence numbers would the server willingly accept as part of this session?
Antworten
-
102 through 104
-
102 through 501
-
102 through 502
-
Anything above 501
Frage 11
Frage
Which of the following is the proper syntax on Windows systems for spawning a command shell on port 56 using Netcat?
Frage 12
Frage
Which of the following best describes a DRDoS?
Antworten
-
Multiple intermediary machines send the attack at the behest of the attacker.
-
The attacker sends thousands upon thousands of SYN packets to the machine with a false source IP address.
-
The attacker sends thousands of SYN packets to the target but never responds to any of the return SYN/ACK packets.
-
The attack involves sending a large number of garbled IP fragments with overlapping, oversized payloads to the target machine.
Frage 13
Frage
Which of the following best describes a teardrop attack?
Antworten
-
The attacker sends a packet with the same source and destination address.
-
The attacker sends several overlapping, extremely large IP fragments.
-
The attacker sends UDP Echo packets with a spoofed address.
-
The attacker uses ICMP broadcast to DoS targets.