What is the known plaintext attack used against DES which gives the result that encrypting plaintext
with one DES key followed by encrypting it with a second DES key is no more secure than using a
single key?
A. Man-in-the-middle attack
B. Meet-in-the-middle attack
C. Replay attack
D. Traffic analysis attack
B
264/264
Why is a penetration test considered to be more thorough than vulnerability scan?
B
Suppose your company has just passed a security risk assessment exercise. The results display that
the risk of the breach in the main company application is 50%. Security staff has taken some
measures and implemented the necessary controls. After that another security risk assessment was
performed showing that risk has decreased to 10%. The risk threshold for the application is 20%.
Which of the following risk decisions will be the best for the project in terms of its successful
continuation with most business profit?
A. Avoid the risk
B. Accept the risk
C. Introduce more controls to bring risk to 0%
D. Mitigate the risk
B
263/264
Questions & Answers PDF
P-
Which of the following Linux commands will resolve a domain name into IP address?
B
Hackers often raise the trust level of a phishing message by modeling the email to look similar to the
internal email used by the target company. This includes using logos, formatting, and names of the
target company. The phishing message will often use the name of the company CEO, president, or
managers. The time a hacker spends performing research to locate this information about a company
is known as?
D
Peter is surfing the internet looking for information about DX Company. Which hacking process is
Peter doing?
C
The tools which receive event logs from servers, network equipment, and applications, and perform
analysis and correlation on those logs, and can generate alarms for security relevant issues, are
known as what?
D
You have successfully logged on a Linux system. You want to now cover your trade Your login attempt
may be logged on several files located in /var/log. Which file does NOT belongs to the list:
C
You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet to.
1.4.0/23. Which of the following IP addresses could be teased as a result of the new configuration?
261/264
Questions & Answers PDF
P-
C
You are analysing traffic on the network with Wireshark. You want to routinely run a cron job which
will run the capture against a specific set of IPs - 192.168.8.0/24. What command you would use?
D