Kevin has been asked to write a short program to gather user input for a web application. He likes to keep his code neat and simple. He chooses to use printf(str) where he should have ideally used printf(?s? str). What attack will his program expose the web application to?
A. Cross Site Scripting
B. Format String Attack
C. SQL injection Attack
D. Unicode Traversal Attack
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
Hayden is the network security administrator for her company, a large finance firm based in Miami. Hayden just returned from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. Hayden is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs responds with a SYN/ACK response. Before the connection is established she sends RST packets to those hosts to stop the session. She does this to see how her intrusion detection system will log the traffic. What type of scan is Hayden attempting here?
A. She is utilizing a SYN scan to find live hosts that are listening on her network
B. Hayden is using a half-open scan to find live hosts on her network
C. The type of scan, she is using is called a NULL scan
D. Hayden is attempting to find live hosts on her company's network by using an XMAS scan
正解:B
質問 3:
SNMP is a protocol used to query hosts, servers and devices about performance or health status data. Hackers have used this protocol for a long time to gather great amount of information about remote hosts. Which of the following features makes this possible?
A. It uses a community string sent as clear text
B. It is used by ALL devices on the market
C. It is susceptible to sniffing
D. It uses TCP as the underlying protocol
正解:A,C
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
The network administrator at Spears Technology, Inc has configured the default gateway Cisco Router's access-list as below:
You are tried to conduct security testing on their network. You successfully brute-force for SNMP community string using a SNMP crack tool. The access-list configured at the router prevents you from establishing a successful connection.
You want to retrieve the Cisco Configuration from the router. How would you proceed?
A. Run Generic Routing Encapsulation (GRE) tunneling protocol from your computer to the router masking your IP address
B. Send a customized SNMP set request with spoofed source IP Address in the range
192.168.1.0
C. Run a network sniffer and capture the returned traffic with the configuration file from the router
D. Use the Cisco's TFTP default password to connect and download the configuration file
正解:B,C
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
The following excerpt is taken from a honeyput log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. Study the log given below and answer the following question:
(Note: The objective of this questions is to test whether the student has learnt about passive OS fingerprinting (which should tell them the OS from log captures): can they tell a SQL injection attack signature; can they infer if a user ID has been created by an attacker and whether they can read plain source - destination entries from log entries.)
What can you infer from the above log?
A. The system has been compromised and backdoored by the attacker.
B. The system is a web application server compromised through SQL injection.
C. The actual IP of the successful attacker is 24.9.255.53.
D. The system is a windows system which is being scanned unsuccessfully.
正解:D
質問 6:
Michael is a junior security analyst working for the National Security Agency (NSA) working primarily on breaking terrorist encrypted messages. The NSA has a number of methods they use to decipher encrypted messages including Government Access to Keys (GAK) and inside informants. The NSA holds secret backdoor keys to many of the encryption algorithms used on the Internet. The problem for the NSA, and Michael, is that terrorist organizations are starting to use custom-built algorithms or obscure algorithms purchased from corrupt governments. For this reason, Michael and other security analysts like him have been forced to find different methods of deciphering terrorist messages. One method that Michael thought of using was to hide malicious code inside seemingly harmless programs. Michael first monitors sites and bulletin boards used by known terrorists, and then he is able to glean email addresses to some of these suspected terrorists. Michael then inserts a stealth keylogger into a mapping program file readme.txt and then sends that as an attachment to the terrorist. This keylogger takes screenshots every 2 minutes and also logs all keyboard activity into a hidden file on the terrorist's computer. Then, the keylogger emails those files to Michael twice a day with a built in SMTP server. What technique has Michael used to disguise this keylogging software?
A. Wrapping
B. Steganography
C. ADS
D. Hidden Channels
正解:B
質問 7:
RC4 is known to be a good stream generator. RC4 is used within the WEP standard on wireless LAN. WEP is known to be insecure even if we are using a stream cipher that is known to be secured.
What is the most likely cause behind this?
A. There is no key management.
B. There are some flaws in the implementation.
C. None of the above.
D. The IV range is too small.
E. All of the above.
正解:E
解説: (Pass4Test メンバーにのみ表示されます)
質問 8:
What does a type 3 code 13 represent?(Choose two.
A. Destination unreachable
B. Port unreachable
C. Time exceeded
D. Network unreachable
E. Echo request
F. Administratively prohibited
正解:A,F
解説: (Pass4Test メンバーにのみ表示されます)
Tanaka -
312-50問題集には丁寧な解説がひたすら書いてあります。次は312-38に挑戦していきたいと思います。