Test Complete Quiz Questions and Answers

You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly. What is the best Nmap command you will use?

Answer :
  • Nmap -T4 -F 10.10.0.0/24

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a Linux platform?

Answer :
  • Kismet

A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server. Based on this information, what should be one of your key recommendations to the bank?

Answer :
  • Place a front-end web server in a demilitarized zone that only handles external web traffic

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

Answer :
  • Residual risk

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing. What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?

Answer :
  • Rules of Engagement

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

Answer :
  • ESP tranport mode

What two conditions must a digital signature meet?

Answer :
  • Has to be unforgeable, and has to be authentic

What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the provider's environment.

Answer :
  • Cloud based

Jim's company regularly performs backups of their critical servers. But the company cannot afford to send backup tapes to an off-site vendor for long-term storage and archiving. Instead, Jim's company keeps the backup tapes in a safe in the office. Jim's company is audited each year, and the results from this year's audit show a risk because backup tapes are not stored off-site. The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?

Answer :
  • Encrypt the backup tapes and transport them in a lock box

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

Answer :
  • Nikto