00:00

QUESTION 71

- (Topic 3)
Which of the following would be the best reason for sending a single SMTP message to an address that does not exist within the target company?

Correct Answer: C
The replay from the email server that states that there is no such recipient will also give you some information about the name of the email server, versions used and so on.

QUESTION 72

- (Topic 9)
Why is Social Engineering considered attractive by hackers and also adopted by experts in the field?

Correct Answer: C
Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information gathering or computer system access and in most (but not all) cases the attacker never comes face-to- face with the victim. The term has been popularized in recent years by well known (reformed) computer criminal and security consultant Kevin Mitnick who points out that it's much easier to trick someone into giving you his or her password for a system than to spend the effort to hack in. He claims it to be the single most effective method in his arsenal.

QUESTION 73

- (Topic 4)
As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security?
Select the best answers.

Correct Answer: BCDE
Explanations:
A is not a correct answer as it is never recommended to use a DNS server for any other application. Hardening of the DNS servers makes them less vulnerable to attack. It is recommended to split internal and external DNS servers (called split-horizon operation). Zone transfers should only be accepted from authorized DNS servers.
By having DNS servers on different subnets, you may prevent both from going down, even if one of your networks goes down.

QUESTION 74

- (Topic 19)
What makes web application vulnerabilities so aggravating? (Choose two)

Correct Answer: AB
As the vulnerabilities exists on a web server, incoming traffic on port 80 will probably be allowed and no firewall rules will stop the attack.

QUESTION 75

- (Topic 3)
What flags are set in a X-MAS scan?(Choose all that apply.

Correct Answer: CDF
FIN, URG, and PSH are set high in the TCP packet for a X-MAS scan