Malware
General Security
Random Security
Command-Line
Really hard questions...sorta
100

An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of a false negative error.

  •    True
  •    False

False

100
  • If you were implementing an Enterprise network that requires remote users connecting to the Intranet, which of the following services would be most important?

    Discuss

    • A. 

      DNS

    • B. 

      DHCP

    • C. 

      RAS

    • D. 

      None of the above

DHCP

100

LDAPS is an example of:

  •    Authentication protocol
  •    Secure directory access protocol
  •    Address resolution protocol
  •    File exchange protocol

Secure directory access protocol

100

A new web server has been provisioned at a third party hosting provider for processing credit card transactions. The security administrator runs the netstat command on the server and notices that ports 80, 443, and 3389 are in a `listening’ state. No other ports are open. Which of the following services should be disabled to ensure secure communications?

A. HTTPS
B. HTTP
C. RDP
D. TELNET

HTTP

100

 A collection of zombies is known as:

  •    Extranet
  •    Zoomies
  •    Botnet 
  •    Rotnet

Botnet

200

 A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online hijacker is called:

  •    Honeypot
  •    Zombie 
  •    Logic bomb
  •    Adware

Zombie

200

You are planning on hosting an eCommerce Web server. You are intent on making the server secure against all external attacks possible. Which of the following would be the best way to test your server for its weaknesses? Choose the best answer.

Discuss

  • A. 

    Ping to the server

  • B. 

    Simulate a DDoS attack on that server

  • C. 

    Simulate a DoS attack on the server

  • D. 

    Check if all the patches and required antivirus software has been loaded o the server.

  • Simulate a DoS attack on the server

200

Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malicious code are known as:

  •    Repositories
  •    Signature files
  •    Macros
  •    Security logs

Signature files

200

While responding to an incident on a new Windows server, the administrator needs to disable unused services. Which of the following commands can be used to see processes that are listening on a TCP port?

A. IPCONFIG
B. Netstat
C. PSINFO
D. Net session

Netstat

200

What are salted hashes?

A hashed value that is masked with extra characters to increase encryption

300

Which of the following answers refers to a technique used by certain types of malware to cause an error in a program and make it easier to run malicious code?

  •    Bluejacking
  •    Buffer overflow
  •    Malicious add-on
  •    Input validation
  •    Pentest

Buffer overflow

300

Which of the following statements about the SHA (Security Hash Algorithm) are true?

A. SHA is a security hash algorithm that is used with encryption protocols
B. Its latest version is SHA-1
C. SHA is built on the downsides of RES

A) SHA is a security hash algorithm that is used with encryption protocols

300

 Which security measure is in place when a client is denied access to the network due to outdated antivirus software?

  •    NAC 
  •    DMZ
  •    VLAN
  •    NAT

NAC

300

You need to record packet data being sent to and from a server running a Linux operating system. After recording the network traffic you want to view the data in a visualization tool like Wireshark. What command line tool is best suited for this task?
A) Tracert
B) Tcpdump
C) Nmap
D) Netstat

TCPDUMP

300

DAILY DOUBLE:

Which protocol enables secure, real-time delivery of audio and video over an IP network?

  •    S/MIME
  •    RTP
  •    SIP
  •    SRTP
  •    SRTP
400

Which type of computer virus takes advantage of the capability for creating and embedding simple scripts in popular office applications?

  •    Phage virus
  •    Macro virus
  •    Retrovirus
  •    Armored virus

B) Macro virus

400

Which of the following terms refers to unwanted applications or files that are not classified as malware, but can worsen the performance of computers and pose security risk?

  •    Grayware 
  •    Shareware
  •    Ransomware
  •    Freeware

Grayware

400

State differences between encoding, hashing, encryption?

Encoding - Convert data into the format required to exchange between different systems

Hashing - Maintains integrity of data, changes in data can be detected by generating and comparing hashes (MD5)

Encryption- Ensure data is secure and confidential cannot be consumed by unauthorized person (AES)

400

What’s the syntax for using ssh to connect to 192.168.1.1?
A) ssh -f . 192.168.1.1
B) ssh -username root -ip 192.168.1.1
C) ssh root@192.168.1.1
D) ssh -ri root 192.168.1.1

C) ssh root@192.168.1.1

400

DAILY DOUBLE:

Which of the answers listed below refers to an XML-based markup language for exchanging authentication and authorization data?
SAML
OpenID Connect
Shibboleth
OAUTH

SAML

500

 Which type of Trojan enables unauthorized remote access to a compromised system?

  •    pcap
  •    RAT 
  •    MaaS
  •    pfSense

RAT

500

DOUBLE POINTS

Describe each layer of the OSI Model and what it does?

Application

Presentation

Session 

Transport

Network

Data Link

Physical

500

DOUBLE POINTS

Which version(s) of the SNMP protocol offer(s) authentication based on community strings sent in an unencrypted form? (Select all that apply)

  •    SNMPv1 
  •    SNMPv2
  •    SNMPv3
  •    SNMPv4
  •    SNMPv1 
  •    SNMPv2
500

What’s the syntax for grepping for “Test123” in all subdirectories, ignoring case:
A) grep -isf . “Test123"
B) grep -irb . “\TEST123\”
C) grep -sb “test123*”
D) grep -ri "test123"

D) grep -ri "test123" .

500

Which port is ICMP?

1) 7

2) 14

3) 223

4) 8685


ITS NONE YOU FOOLS

M
e
n
u