QUESTION: 1
You have just attempted to perform DNS poisoning on the local network DNS server and did not
succeed;you decide to launch an attack against routing tables instead. Which of the following
would NOT be an effective way of attempting to manipulate the routing table on the local
network or through its gateway?
A. By using a source route attack
B. By using ICMP redirect messages
C. By adverstising bogus OSDF routes
D. By advertising bogus RIP routes
Answer(s): C
QUESTION: 2
Why is it so chal enging to block packets from Remote Access Troans that use port 80 for
network communications?Choose three.
A. To a firewall, the traffic appears simply to be from an internal user making an innoccous
HTTP GET request.
B. Port 80 outbound is normally open on corporate firewalls
C. Stateful inspection firewal s will block unsolicited inbound HTTP GET requests
D. Not all firewalls are capable of inspecing data in the HTTP data fields for evidence of
tunneling
Answer(s): A, B, D
QUESTION: 3
Which of the following statements would best describe the act of signing a message with a
Digital Signature?
A. The sender creates a hash value of the message he wishes to send He uses his private key
to encrypt the hash value.
The message and the encrypted hash value are sent to the receiver.
B. The sender creates a hash value of the message he wishes to send.
He uses his public key to encrypt the hash value.
The message and the encrypted has value are sent to the receiver.
C. The sender creates a hash value of the message he wihes to send.
The message and the hash value are sent to the receiver.
D. The sender uses his public key to create a digital signature.
The digital signature is sent along with the text message.
The receiver wil use the sender private key to validate the signature.
Answer(s): A
QUESTION: 4
One of the last steps taken by an attacker wil be to configure permanent access to a
compromised system.