- (Topic 1)
A company??s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?
Correct Answer:A
- (Topic 1)
What is not a PCI compliance recommendation?
Correct Answer:C
https://www.pcisecuritystandards.org/pci_security/maintaining_payment_security Build and Maintain a Secure Network
* 1. Install and maintain a firewall configuration to protect cardholder data.
* 2. Do not use vendor-supplied defaults for system passwords and other security parameters.
Protect Cardholder Data
* 3. Protect stored cardholder data.
* 4. Encrypt transmission of cardholder data across open, public networks.
Maintain a Vulnerability Management Program
* 5. Use and regularly update anti-virus software or programs.
* 6. Develop and maintain secure systems and applications.
Implement Strong Access Control Measures
* 7. Restrict access to cardholder data by business need-to-know.
* 8. Assign a unique ID to each person with computer access.
* 9. Restrict physical access to cardholder data.
Regularly Monitor and Test Networks
* 10. Track and monitor all access to network resources and cardholder data.
* 11. Regularly test security systems and processes.
Maintain an Information Security Policy
* 12. Maintain a policy that addresses information security for employees and contractors.
- (Topic 3)
Rebecca, a security professional, wants to authenticate employees who use web services for safe and secure communication. In this process, she employs a component of the Web Service Architecture, which is an extension of SOAP, and it can maintain the integrity and confidentiality of SOAP messages.
Which of the following components of the Web Service Architecture is used by Rebecca for securing the communication?
Correct Answer:D
- (Topic 3)
When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers manually to get more precise results than if using web vulnerability scanners.
What proxy tool will help you find web vulnerabilities?
Correct Answer:C
- (Topic 3)
Being a Certified Ethical Hacker (CEH), a company has brought you on board to evaluate the safety measures in place for their network system. The company uses a network time protocol server in the demilitarized zone.
During your enumeration, you decide to run a ntptrace command. Given the syntax: ntptrace [-n] [-m maxhosts] [servername/IP_address], which command usage would best serve your objective to find where the NTP server obtains the time from and to trace the list of NTP servers connected to the network?
Correct Answer:D
The command usage that would best serve your objective to find where the NTP server obtains the time from and to trace the list of NTP servers connected to the network is ntptrace -n -m 5 192.168.1.1. This command usage works as follows:
✑ ntptrace is a tool that determines where a given NTP server gets its time from, and
follows the chain of NTP servers back to their master time source. For example, a stratum 0 server, which is a device that directly obtains the time from a physical source, such as an atomic clock or a GPS receiver1.
✑ -n is a flag that outputs host IP addresses instead of host names. This can be
useful if the host names are not resolvable or if the IP addresses are more informative1.
✑ -m 5 is a flag that specifies the maximum number of hosts to be traced. This can
be useful to limit the output and avoid tracing irrelevant or unreachable hosts1.
✑ 192.168.1.1 is the IP address of the NTP server in the demilitarized zone, which is the starting point of the trace. This can be useful to find out the source and the
path of the time synchronization for the network system1.
By using this command usage, the output will show the IP addresses, the stratum, the offset, the sync distance, and the reference ID of each NTP server in the chain, up to five hosts. This can provide valuable information about the accuracy, the reliability, and the security of the time service for the network system1.
The other options are not as suitable as option D for the following reasons:
✑ A. ntptrace -m 5 192.168.1.1: This option is similar to option D, but it does not use the -n flag, which means that it will output host names instead of IP
addresses. This can be less useful if the host names are not resolvable or if the IP addresses are more informative1.
✑ B. tptrace 192.1681.: This option is incorrect because it uses a wrong tool name
and a wrong IP address. tptrace is not a valid tool name, and 192.1681. is not a valid IP address. The correct tool name is ntptrace, and the correct IP address is 192.168.1.11.
✑ C. ntptrace -n localhost: This option is not effective because it uses localhost as
the starting point of the trace, which means that it will only show the local host??s time source. This can be useful to check the local host??s time configuration, but it does not help to find out the time source and the trace of the NTP server in the demilitarized zone, which is the objective of this scenario1.
References:
✑ 1: ntptrace - trace a chain of NTP servers back to the primary source
- (Topic 2)
jane, an ethical hacker. Is testing a target organization's web server and website to identity security loopholes. In this process, she copied the entire website and its content on a local drive to view the complete profile of the site's directory structure, file structure, external links, images, web pages, and so on. This information helps jane map the website's directories and gain valuable information. What is the attack technique employed by Jane in the above scenario?
Correct Answer:A
A mirror site may be a website or set of files on a computer server that has been copied to a different computer server in order that the location or files are available from quite one place. A mirror site has its own URL, but is otherwise just like the principal site. Load-balancing devices allow high-volume sites to scale easily, dividing the work between multiple mirror sites.A mirror site is typically updated frequently to make sure it reflects the contents of the first site. In some cases, the first site may arrange for a mirror site at a bigger location with a better speed connection and, perhaps, a better proximity to an outsized audience.If the first site generates an excessive amount of traffic, a mirror site can ensure better availability of the web site or files. For websites that provide copies or updates of widely used software, a mirror site allows the location to handle larger demands and enables the downloaded files to arrive more quickly. Microsoft, Sun Microsystems and other companies have mirror sites from which their browser software are often downloaded.Mirror sites are wont to make site access faster when the first site could also be geographically distant from those accessing it. A mirrored web server is usually located on a special continent from the principal site, allowing users on the brink of the mirror site to urge faster and more reliable access.Mirroring an internet site also can be done to make sure that information are often made available to places where access could also be unreliable or censored. In 2013, when Chinese authorities blocked access to foreign media outlets just like the Wall Street Journal and Reuters, site mirroring was wont to restore access and circumvent government censorship.