Question
A. WPA
B. CCMP
C. WEP
D. WPA2
click below
click below
Question
A. True negative
B. True positive
C. False negative
D. False positive
Normal Size Small Size show me how
PT 9
Question | Answer |
---|---|
Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP? A. WPA B. CCMP C. WEP D. WPA2 | A. WPA |
ou log into the MySQL server and verify that you are currently running version 3.5.3. Based on the item shown on the image, what best describes how you should categorize this finding? A. True negative B. True positive C. False negative D. False positive | D. False positive |
Which of the port numbers listed below are used by FTP over TLS/SSL (FTPS)? (Select 2 answers) A. 20 B. 989 C. 5060 D. 21 E. 990 | B. 989 E. 990 |
An FTP data transfer connection is established through a TCP port number: A. 23 B. 25 C. 21 D. 20 | D. 20 |
he Secure Shell (SSH) protocol uses TCP port: A. 23 B. 25 C. 21 D. 22 | D. 22 |
Which of the following answers refers to a port number assigned to the Kerberos authentication system? A. 49 B. 88 C. 1645 D. 1723 | B. 88 |
An SNMP management station receives SNMP notifications from Agents on UDP port: A. 161 B. 137 C. 162 | |
TACACS+ runs on TCP port: A. 389 B. 49 C. 636 D. 88 | C. 636 |
Which of the following ports are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers) A. 989 B. 1812 C. 5060 D. 990 E. 1813 F. 5061 | C. 5060 F. 5061 |
Which of the ports listed below are used by RADIUS? (Select 2 answers) A. 989 B. 1812 C. 5060 D. 990 E. 1813 | B. 1812 E. 1813 |
Network Time Protocol (NTP) runs on UDP port: A. 123 B. 110 C. 161 D. 137 | A. 123 |
Which of the TCP port numbers listed below is assigned to the Internet Message Access Protocol (IMAP)? A. 143 B. 389 C. 443 | A. 143 |
An SNMP Agent receives requests on UDP port: A. 161 B. 137 C. 162 D. 138 | A. 161 |
Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP? A. WPA B. CCMP C. WEP D. WPA2 | A. WPA |
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected setup PIN to exploit the WAP and recover the WPA2 password. What type of attack is this? A. Evil twin B. Rogue WAP C. IV attack D. WPS attack | D. WPS attack |
You log into the MySQL server and verify that you are currently running version 3.5.3. Based on the item shown on the image, what best describes how you should categorize this finding? A. True negative B. True positive C. False negative D. False positive | D. False positive |
An FTP data transfer connection is established through a TCP port number: A. 23 B. 25 C. 21 D. 20 | D. 20 |
Which of the following ports are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers) A. 989 B. 1812 C. 5060 D. 990 E. 1813 F. 5061 | C. 5060 F. 5061 |
A network administrator has been asked to set up a VPN link on a connecting host with no dedicated VPN client application installed. Which of the following ports needs to be opened to enable this type of connection? A. 443 B. 22 C. 143 D. 3389 | A. 443 |
Which of the following statements apply to the definition of a computer virus? (Select 3 answers) A. A self-replicating computer program containing malicious segment B. Requires its host application to be run to make the virus active C. A standalone malicious computer program that replicates itself over a computer network D. Can run by itself without any interaction E. Attaches itself to an application program or other executable component | A self-replicating computer program containing malicious segment B. Requires its host application to be run to make the virus active E. Attaches itself to an application program or other executable component |
Which of the cryptographic algorithms listed below is the least vulnerable to attacks? A. AES B. RC4 C. 3DES D. DES | A. AES |
Which of the answers listed below refers to a common target of cross-site scripting (XSS)? A. Alternate sites B. Removable storage C. Physical security D. Dynamic web pages | D. Dynamic web pages |
Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses? A. arp -e B. netstat -n C. nslookup D. arp -a | D. arp -a |
Which cryptographic attack relies on the concepts of probability theory? A. Birthday B. KPA C. Dictionary D. Brute-force | A. Birthday |
Which of the following is not a certificate trust model for arranging Certificate Authorities? A. Bridge CA architecture B. Hierarchical CA architecture C. Single-CA architecture D. Sub-CA architecture | D. Sub-CA architecture |
Which of the attack types listed below relies on the amplification effect? A. Brute-force attack B. Zero-day attack C. MITM attack D. DDoS attack | D. DDoS attack |
Which of the block cipher modes listed below provides both data integrity and confidentiality? A. CBC B. GCM C. ECB D. CTR | B. GCM |
Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use? A. CBC B. GCM C. ECB D. CTR | C. ECB |
AES-based encryption mode implemented in WPA2 is known as: A. CCMP B. ECB C. CBC D. TKIP | A. CCMP |
Which of the answers listed below refers to the most common format in which Certificate Authorities (Cissue certificates? A. CER B. PEM C. DER D. P7B | B. PEM |
Which of the following terms illustrate(s) the security through obscurity concept? (Select all that apply) A. Code obfuscation B. Steganography C. SSID broadcast suppression D. Encryption E. Substitution ciphers | A. Code obfuscation B. Steganography C. SSID broadcast suppression E. Substitution ciphers |
Which of the following terms is used in conjunction with the assumption that the output of a cryptographic function should be considerably different from the corresponding plaintext input? A. Confusion B. Obfuscation C. Collision D. Diffusion | A. Confusion |
What is the fastest way for validating a digital certificate? A. CRL B. Key escrow C. OCSP D. CSR | C. OCSP |
An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker’s IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario? A. Cross-site request forgery B. ARP poisoning C. DNS poisoning D. Replay attack | B. ARP poisoning |
Examples of means that provide randomization during the encryption process include: (Select 3 answers) A. Cryptographic nonce B. Obfuscation C. Salting D. Initialization Vector (IV) E. Shimming | A. Cryptographic nonce C. Salting D. Initialization Vector (IV) E. Shimming |
Which of the three states of digital data requires data to be processed in an unencrypted form? A. Data-in-transit B. Data-at-rest C. Data-in-use | C. Data-in-use |
Which of the statements listed below describe the purpose behind collecting OSINT? (Select 3 answers) A. Disabling unnecessary ports and services B. Active reconnaissance in penetration testing C. Gaining advantage over competitors D. Application whitelisting/blacklisting E. Passive reconnaissance in penetration testing F. Preparation before launching a cyberattack | C. Gaining advantage over competitors E. Passive reconnaissance in penetration testing F. Preparation before launching a cyberattack |
You’re tasked with configuring a friend’s SOHO router and noticed a PIN on the back of their router. What is the purpose of this PIN? A. This is a WEP PIN B. This is a WPS PIN C. This is a WPA PIN D. This is a Bluetooth PIN | B. This is a WPS PIN |
Which of the following answers lists an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters? A. -a B. /? C. /all D. /-a | C. /all |
Which of the following answers lists an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters? A. -a B. /? C. /all D. /-a | C. /all |