Home
You may like this!
51.
What is the hexadecimal value of a NOP instruction in an Intel system?

  • A.
    0x99
  • B.
    0x90
  • C.
    0x80
  • D.
    99x0
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
0x90 is the hexadecimal value of a NOP instruction for Intel-based systems. Remember to keep an eye out for this value; it indicates a NOP and possibly a NOP sled, which could indicate a buffer overflow condition in progress.
Report
Name Email  
52.
Which pointer in a program stack gets shifted or overwritten during a successful overflow attack?
  • A.
    ESP
  • B.
    ECP
  • C.
    EIP
  • D.
    EBP
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
A successful overflow attack can change the value of an Extended Instruction Pointer (EIP) saved on the stack.
Report
Name Email  
53.
Groups and individuals who hack systems based on principle or personal beliefs are known as ___________.
  • A.
    White hats
  • B.
    Black hats
  • C.
    Script kiddies
  • D.
    Hacktivists
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Hacktivists get their title from the paradigm of hacktivism. These hackers launch attacks against targets because they believe those targets violate the attackers’ morals, ethics, or principles.
Report
Name Email  
54.
Jason is the local network administrator who has been tasked with securing the network from possible DoS attacks. Within the last few weeks, some traffic logs appear to have internal clients making requests from outside the internal LAN. Based on the traffic Jason has been seeing, what action should he take?
  • A.
    Throttle network traffic.
  • B.
    Update antivirus definitions.
  • C.
    Implement egress filtering.
  • D.
    Implement ingress filtering
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Throttling network traffic will slow down a potential DoS attack; however, an ingress filter will check for internal addresses coming in from the public side. This is a good indicator of a spoofed IP.
Report
Name Email  
55.
Which DoS attack sends traffic to the target with a spoofed IP of the target itself?
  • A.
    Land
  • B.
    Smurf
  • C.
    Teardrop
  • D.
    SYN flood
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
A land attack fits this description. Smurf Attacks deal with ICMP echo requests going back to a spoofed target address. SYN floods use custom packets that barrage a target with requests. Teardrop attacks use custom fragmented packets that have overlapping offsets.
Report
Name Email