Topic 1: Exam Pool A
The use of warning banners helps a company avoid litigation by overcoming an employee
assumed __________________________. When connecting to the company's intranet,
network or Virtual Private Network(VPN) and will allow the company's investigators to
monitor, search and retrieve information stored within the network.
A.
Right to work
B.
Right of free speech
C.
Right to Internet Access
D.
Right of Privacy
Right of Privacy
During the course of a corporate investigation, you find that an Employee is committing a crime. Can the Employer file a criminal complaint with Police?
A.
Yes, and all evidence can be turned over to the police
B.
Yes, but only if you turn the evidence over to a federal law enforcement agency
C.
No, because the investigation was conducted without following standard police
procedures
D.
No, because the investigation was conducted without warrant
Yes, and all evidence can be turned over to the police
Office Documents (Word, Excel and PowerPoint) contain a code that allows tracking the MAC or unique identifier of the machine that created the document. What is that code called?
A.
Globally unique ID
B.
Microsoft Virtual Machine Identifier
C.
Personal Application Protocol
D.
Individual ASCII string
Globally unique ID
You are the network administrator for a small bank in Dallas, Texas. To ensure network
security, you enact a security policy that requires all users to have 14 character passwords.
After giving your users 2 weeks notice, you change the Group Policy to force 14 character
passwords. A week later you dump the SAM database from the standalone server and run
a password-cracking tool against it. Over 99% of the passwords are broken within an hour.
Why were these passwords cracked so Quickly?
A.
Passwords of 14 characters or less are broken up into two 7-character hashes
B.
A password Group Policy change takes at least 3 weeks to completely replicate
throughout a network
C.
Networks using Active Directory never use SAM databases so the SAM database pulled was empty
D.
The passwords that were cracked are local accounts on the Domain Controller
Passwords of 14 characters or less are broken up into two 7-character hashes
At what layer of the OSI model do routers function on?
A.
4
B.
3
C.
1
D.
5
3
Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and
wants to hack into his former company's network. Since Simon remembers some of the
server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon
trying to accomplish here?
A.
Send DOS commands to crash the DNS servers
B.
Perform DNS poisoning
C.
Perform a zone transfer
D.
Enumerate all the users in the domain
Perform a zone transfer
What does the acronym POST mean as it relates to a PC?
A.
Primary Operations Short Test
B.
PowerOn Self Test
C.
Pre Operational Situation Test
D.
Primary Operating System Test
PowerOn Self Test
If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?
A.
The zombie will not send a response
B.
31402
C.
31399
D.
31401
31401
With Regard to using an Antivirus scanner during a computer forensics investigation, You should:
A.
Scan the suspect hard drive before beginning an investigation
B.
Never run a scan on your forensics workstation because it could change your systems configuration
C.
Scan your forensics workstation at intervals of no more than once every five minutes during an investigation
D.
Scan your Forensics workstation before beginning an investigation
Scan your Forensics workstation before beginning an investigation
You are carrying out the last round of testing for your new website before it goes live. The
website has many dynamic pages and connects to a SQL backend that accesses your
product inventory in a database. You come across a web security site that recommends
inputting the following code into a search field on web pages to check for vulnerabilities:
When you type this and click on search, you receive a pop-up window that says: "This is a
test."
What is the result of this test?
A.
Your website is vulnerable to CSS
B.
Your website is not vulnerable
C.
Your website is vulnerable to SQL injection
D.
Your website is vulnerable to web bugs
Your website is vulnerable to CSS
What header field in the TCP/IP protocol stack involves the hacker exploit known as the Ping of Death?
A.
ICMP header field
B.
TCP header field
C.
IP header field
D.
UDP header field
TCP header field
Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and zombies? What type of Penetration Testing is Larry planning to carry out?
A.
Router Penetration Testing
B.
DoS Penetration Testing
C.
Firewall Penetration Testing
D.
Internal Penetration Testing
DoS Penetration Testing
Page 5 out of 50 Pages |
Previous |