Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run
on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot.
Andrew wants to check the booting process. He suspects that an error persists in the bootloader of
Mac OS X. Which of the following is the default bootloader on Mac OS X that he should use to resolve
the issue?
B
Sasha wants to add an entry to your DNS database for your mail server. Which of the following types
of resource records will she use to accomplish this?
C
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite
fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
A, B, C
Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
D
Which of the following statements about a host-based intrusion prevention system (HIPS) are true?
Each correct answer represents a complete solution. Choose two.
B, C
Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized
Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet.
Which of the following security threats may occur if DMZ protocol attacks are performed?
Each correct answer represents a complete solution. Choose all that apply.
A, B, D
Which of the following is known as a message digest?
A
Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet
forum for online discussion. When a user visits the infected Web page, code gets automatically
executed and Ryan can easily perform acts like account hijacking, history theft etc.
Which of the following types of Cross-Site Scripting attack Ryan intends to do?
D
Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to
investigate the computer of an employee, who is suspected for classified data theft. Suspect's
computer runs on Windows operating system. Peter wants to collect data and evidences for further
analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for
proper and efficient analysis. Which of the following is the correct order for searching data on a
Windows based system?
B
You are the Network Administrator for a large corporate network. You want to monitor all network
traffic on your local network for suspicious activities and receive a notification when a possible attack
is in process. Which of the following actions will you take for this?
B
Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a
suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he
review to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
A, B, C
This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a,
802.11b, and 802.11g standards. The main features of these tools are as follows:
It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc.
It is commonly used for the following purposes:
D
SSH is a network protocol that allows data to be exchanged between two networks using a secure
channel. Which of the following encryption algorithms can be used by the SSH protocol?
Each correct answer represents a complete solution. Choose all that apply.
A, B, C
Adam works as a Security Analyst for Umbrella Inc. He is performing real-time traffic analysis on IP
networks using Snort. Adam is facing problems in analyzing intrusion dat
a. Which of the following software combined with Snort can Adam use to get a visual representation
of intrusion data?
Each correct answer represents a complete solution. Choose all that apply.
A, B, D
Mark works as a Network Security Administrator for BlueWells Inc. The company has a
Windowsbased network. Mark is giving a presentation on Network security threats to the newly
recruited employees of the company. His presentation is about the External threats that the
company recently faced in the past. Which of the following statements are true about external
threats?
Each correct answer represents a complete solution. Choose three.
A, C, D