Free Ethical Hacker Security Questions and Answers
How can telnet be used to fingerprint a web server?
Correct!
Wrong!
Simon is security analyst writing signatures for a Snort node he placed internally that captures all mirrored traffic from his border firewall.
From the following signature, what will Snort look for in the payload of the suspected packets?
alert tcp $EXTERNAL_NET any -> $HOME_NET 27374 (msG."BACKDOOR SIG - SubSseven 22";flags: A +; content: "|0d0a5b52504c5d3030320d0a|"; reference:arachnids, 485;) alert
Correct!
Wrong!
A medium-sized healthcare IT business decides to implement a risk management strategy.
Which of the following is NOT one of the five basic responses to risk?
Correct!
Wrong!
What is the least important information when you analyze a public IP address in a security alert?
Correct!
Wrong!
You work as a Security Analyst for a retail organization. In securing the company's network, you set up a firewall and an IDS. However, hackers are able to attack the network.
After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed.
What type of alert is the IDS giving?
Correct!
Wrong!
Claire is surfing the Web and, after some time, a message pops up stating her system has been infected by malware and offering a button to click for removal of the virus. After she clicks the button, another message window appears stating the system has been quarantined due to the nature of the infection and provides a link with instructions to pay in order to regain control and to clear the virus. Which of the following best describes this infection?
Correct!
Wrong!
A penetration tester is hired to do a risk assessment of a company's DMZ.
The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems.
What kind of test is being performed?
Correct!
Wrong!
When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?
Correct!
Wrong!
During a security audit of IT processes, an IS auditor found that there were no documented security procedures.
What should the IS auditor do?
Correct!
Wrong!
How many bits encryption does SHA-1 use?
Correct!
Wrong!
What port number is used by LDAP protocol?
Correct!
Wrong!