00:00

QUESTION 6

- (Topic 7)
ARP poisoning is achieved in steps

Correct Answer: B
The hacker begins by sending a malicious ARP "reply" (for which there was no previous request) to your router, associating his computer's MAC address with your IP Address. Now your router thinks the hacker's computer is your computer. Next, the hacker sends a malicious ARP reply to your computer, associating his MAC Address with the routers IP Address. Now your machine thinks the hacker's computer is your router. The hacker has now used ARP poisoning to accomplish a MitM attack.

QUESTION 7

- (Topic 2)
While footprinting a network, what port/service should you look for to attempt a zone transfer?

Correct Answer: B
IF TCP port 53 is detected, the opportunity to attempt a zone transfer is there.

QUESTION 8

- (Topic 2)
User which Federal Statutes does FBI investigate for computer crimes involving e- mail scams and mail fraud?

Correct Answer: B
http://www.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00001030---- 000-.html

QUESTION 9

- (Topic 8)
What do you call a system where users need to remember only one username and password, and be authenticated for multiple services?

Correct Answer: C
Single sign-on (SSO) is a specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.

QUESTION 10

- (Topic 7)
When Jason moves a file via NFS over the company's network, you want to grab a copy of it by sniffing. Which of the following tool accomplishes this?

Correct Answer: C
Filesnarf - sniff files from NFS traffic OPTIONS
-i interface
Specify the interface to listen on.
-v "Versus" mode. Invert the sense of matching, to select non-matching files.
pattern
Specify regular expression for filename matching.
expression
Specify a tcpdump(8) filter expression to select traffic to sniff.
SEE ALSO
Dsniff, nfsd