Test Complete Quiz Questions and Answers

What is correct about digital signatures?

Answer :
  • A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.

You have gained physical access to a Windows 2008 R2 server with an accessible disc drive. When you try to boot the server and log in, you cannot guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change users' passwords or activate disabled Windows accounts?

Answer :
  • CHNTPW

You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly. What is the best Nmap command you will use?

Answer :
  • Nmap -T4 -F 10.10.0.0/24

Which tools are used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a Linux platform?

Answer :
  • Kismet

Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. What is the name of the command used by SMTP to transmit email over TLS?

Answer :
  • STARTTLS

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing. What document describes the specifics of the testing, and the associated violations and essentially protects both the organization's interest and your liabilities as a tester?

Answer :
  • Rules of Engagement

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

Answer :
  • ESP tranport mode

A regional bank hires your company to perform a security assessment on its network after a recent data breach. The attacker could steal financial data from the bank by compromising only a single server. Based on this information, what should be one of your key recommendations to the bank?

Answer :
  • Place a front-end web server in a demilitarized zone that only handles external web traffic

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures deployed?

Answer :
  • Residual risk

What two conditions must a digital signature meet?

Answer :
  • Has to be unforgeable, and has to be authentic