- (Topic 23)
Wayne is the senior security analyst for his company. Wayne is examining some traffic logs on a server and came across some inconsistencies. Wayne finds some IP packets from a computer purporting to be on the internal network. The packets originate from
192.168.12.35 with a TTL of 15. The server replied to this computer and received a response from 192.168.12.35 with a TTL of 21. What can Wayne infer from this traffic log?
Correct Answer:
A
- (Topic 4)
Which DNS resource record can indicate how long any "DNS poisoning" could last?
Correct Answer:
B
The SOA contains information of secondary servers, update intervals and expiration times.
- (Topic 23)
You generate MD5 128-bit hash on all files and folders on your computer to keep a baseline check for security reasons?
What is the length of the MD5 hash?
Correct Answer:
C
- (Topic 18)
Rebecca is a security analyst and knows of a local root exploit that has the ability to enable local users to use available exploits to gain root privileges. This vulnerability exploits a condition in the Linux kernel within the execve() system call. There is no known workaround that exists for this vulnerability. What is the correct action to be taken by Rebecca in this situation as a recommendation to management?
Correct Answer:
B
- (Topic 8)
A Buffer Overflow attack involves:
Correct Answer:
D
B is a denial of service. By flooding the data buffer in an application with trash you could get access to write in the code segment in the application and that way insert your own code.