Bryce, who is a great security professional with a perfect track record,has just been called into his supervisor's office.
His supervisor has the sad task of letting him know that hes the next position being cut in their downsizing effort.Bryce has been known to be a mellow type of person but the version of being unemployed after working for 25 years at the same company is just a bit too much for him.He cannot understand why newer employees with only a few years of experience have not been fired before him and why he is the one that must leave.Bryce tells himself that is employer is going to pay dearly for this and hes planning to use his skills to cause disruption within the company infrastructure.
Which of the following term would best describe the reaction of Bryce?
A. Cracker
B. Disgruntied Employee
C. Ethical Hacker
D. Revenge Master
Henry and Paul are debating the purchase of a $1500-00 automated vulnerability software package.What is the main disadavantage regarding the automated compared to manual assessments:
A. The network manager gets personal commission when purchasing the software package.
B. False Positive negative results
C. Greater degree of accuracy
D. Reducing Workforce costs
A TCP connect Scan which is also called a Vanilla TCP port scan will send a SYN packet to ports sequentially to see which are open.
Using the Vanilla TCP Port Scan, what would be expected as a response from a port that is open?
A. FIN
B. SYN/ACK
C. RST/ACT
D. ACK
MS SQL server makes use of Stored Procedures.There is an extended stored procedure called sp_makewebtask that can be used with data being returned from executed queries.What would you use this stored procedure for?
A. It is used to start a new web server instance
B. It is used to create and HTML page
C. It is used to perform an entry within a database
D. It is used to schedule a job task
What technologies could a company deploy to protect all data passing from an employees home computer to the corporate intranet?Choose two.
A. L2TP/Ipsec
B. PPTP/MPPE
C. WEP
D. IKE
Why are Trojans such as Beast a lot harder to detect? Choose the best answer.
A. They use a well known name to hide themselves
B. They inject themselves into another process
C. They have a polymorphic payload
D. They are self garbling and cannot be detected
When referring to database,what would you call the number of rows within a table?
A. Cardinality
B. Degree
C. Domain
D. Candidate
Which scripting language do most open source vulnerability scanners use?
A. ASNL (Automated Security Nessus Language)
B. NASL (Nessus Attack Scripting Language)
C. SANL (Security Attack Nessus Language)
D. NASA (Nessus Automated Security Attack)
Which of the following SQL injection scripts would attempt to discover all usernames on the table users beginning with Ad?
A. SELECT *FROM* WHERE username =AD*
B. OR 1=1; SELECT username FROM users WHERE username LIKE ad%:
C. SELECT name FROM Master..sysxlogins
D. OR 1=2 WHERE name is like AD%
One key skill a penetration Tester must possess is documentation.
There are different documents that will be produced in the course of doing a penetration test,out of the documents listed below which one would be the most important document that a Penetration Tester must have in order to be performing a test?
A. Network Diagram
B. Host and services list
C. Written Authorization
D. Security Policies