IT Security Operations Final Exam Questions - 673 Verified Questions

Page 1


Chapter 4: Footprinting and Social Engineering

Available Study Resources on Quizplus for this Chatper

51 Verified Questions

51 Flashcards

Source URL: https://quizplus.com/quiz/41513

Sample Questions

Q1) ____ is a tool that is used to read and write data to ports over a network.

A)Whois

B)Netcat

C)Metis

D)Dig

Q2) Elaborate on the following statement: "The most difficult job of a security professional is preventing social engineers from getting crucial information from company employees."

Q3) To see additional parameters that can be used with the ____ command, you can type nc -h at the command prompt.

A)Nslookup

B)Namedroppers

C)Netcat

D)Whois

Q4) With commands such as ____, you can perform zone transfers of all DNS records.

A)Dig

B)Whois

C)DNS

D)Netcat

Q5) As a security tester, should you use social-engineering tactics?

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Programming for Security Professionals

Available Study Resources on Quizplus for this Chatper

53 Verified Questions

53 Flashcards

Source URL: https://quizplus.com/quiz/41516

Sample Questions

Q1) A loop usually completes after ____________________ is conducted on a variable and returns a value of true or false.

Q2) List and describe the variable types used in C.

Q3) The C programming language was developed by ____ at Bell Laboratories in 1972.

A)James Gosling

B)Larry Wall

C)Dennis Ritchie

D)Larry Tesler

Q4) In HTML, each tag has a matching closing tag that's written with a(n) ____ added.

A)forward slash (/)

B)backward slash (\)

C)bang (!)

D)ampersand (&)

Q5) The Win32 class contains many functions you can call from your Perl script. How can attackers use these functions? Should security professionals become proficient at using them in a program?

Q6) In programming, what are variables used for?

Q7) Why is documenting computer programs essential?

Q8) What is a dangerous thing about programming in the C language?

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Desktop and Server Os Vulnerabilities

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41517

Sample Questions

Q1) Microsoft's Systems Management Server (SMS) can manage security patches for all computers on a network.

A)True

B)False

Q2) A common Linux rootkit is ____.

A)Back Orfice

B)Kill Trojans

C)Packet Storm Security

D)Linux Rootkit 5

Q3) The best way to protect a network from SMB attacks is to make sure routers filter out ports 137 to 139 and ____.

A)135

B)389

C)445

D)636

Q4) What is the purpose of a file system?

Q5) In Microsoft systems, an excellent resource for finding configuration errors, missing patches, and so on is the ________________________________________.

Q6) What is Samba used for?

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Embedded Operating Systems: The Hidden Threat

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41518

Sample Questions

Q1) Wind River produces an open-source Linux OS for embedded systems and an OS microkernel extension called ____.

A)RTEMS

B)QNX

C)VxWorks

D)RTLinux

Q2) What is the collective name for embedded versions of Windows Enterprise OSs, such as XP Professional, Windows Vista Business and Ultimate, and Windows 7 Ultimate and Professional?

A)Windows Business Suites

B)Embedded Systems Suite

C)Embedded Windows Servers

D)Windows Embedded Enterprise

Q3) One type of specialized embedded OS is a(n) ____, typically used in devices such as programmable thermostats, appliance controls, and even spacecraft.

A)RTOS

B)VoP

C)MILS

D)SCADA

Page 11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Hacking Web Servers

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/41519

Sample Questions

Q1) What is ODBC used for?

Q2) CGI programs can be written in many different programming and scripting languages, such as C/C++, Perl, UNIX shells, Visual Basic, and FORTRAN.

A)True

B)False

Q3) ____________________ Web pages can vary the information that's displayed depending on variables such as the current time and date, user name, and purchasing history (information collected via cookies or Web bugs).

Q4) ____, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system.

A)OLE DB

B)ODBC

C)ADO

D)JDBC

Q5) Web applications written in CFML can also contain other client-side technologies, such as HTML and JavaScript.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Hacking Wireless Networks

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/41520

Sample Questions

Q1) WPA improves encryption by using ____.

A)WEP

B)TKIP

C)802.1X

D)RADIUS

Q2) The ____ standard has improvements to address the problem of interference.

A)802.11a

B)802.11b

C)802.11e

D)802.11g

Q3) There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.

A)True

B)False

Q4) What is the role of a WNIC?

Q5) The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected. A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Cryptography

Available Study Resources on Quizplus for this Chatper

58 Verified Questions

58 Flashcards

Source URL: https://quizplus.com/quiz/41521

Sample Questions

Q1) uses a single key to encrypt and decrypt data

A)asymmetric encryption

B)collision free

C)symmetric encryption

D)certificate

E)hashing

F)collision

G)stream cipher

H)message digest

I)block cipher

Q2) What is a substitution cipher?

Q3) What is RC5?

Q4) In a chosen-ciphertext attack, the attacker needs access to the cryptosystem to perform the attack.

A)True

B)False

Q5) Asymmetric algorithms are more scalable than symmetric systems. However, they are slower than symmetric algorithms.

A)True

B)False

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Network Protection Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41522

Sample Questions

Q1) What is a path-vector routing protocol?

Q2) internal private IP addresses are mapped to public external IP addresses

A)stateful packet filter

B)firewall

C)NAT

D)DMZ

E)stateless packet filter

F)user mode

G)enable mode

H)ASA

I)privileged mode

Q3) List the components of a Cisco router.

Q4) ____ runs hacker-enticing services and written and documented in Portuguese, but the easy-to-use graphical interface makes up for any time spent translating.

A)Valhala

B)Honeyd

C)Nepenthes

D)SANS Internet Storm Center

Q5) What is honeyd? How does it work?

Q6) How do you know what mode a Cisco router is in?

Page 15

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.