51.
What is the hexadecimal value of a NOP instruction in an Intel system?
- A.0x99
- B.0x90
- C.0x80
- D.99x0
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
0x90 is the hexadecimal value of a NOP instruction for Intel-based systems. Remember to keep an eye out for this value; it indicates a NOP and possibly a NOP sled, which could indicate a buffer overflow condition in progress. |
52.
Which pointer in a program stack gets shifted or overwritten during a successful
overflow attack?
- A.ESP
- B.ECP
- C.EIP
- D.EBP
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
A successful overflow attack can change the value of an Extended Instruction Pointer (EIP) saved on the stack. |
53.
Groups and individuals who hack systems based on principle or personal beliefs are
known as ___________.
- A.White hats
- B.Black hats
- C.Script kiddies
- D.Hacktivists
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Hacktivists get their title from the paradigm of hacktivism. These hackers launch attacks against targets because they believe those targets violate the attackers’ morals, ethics, or principles. |
54.
Jason is the local network administrator who has been tasked with securing the
network from possible DoS attacks. Within the last few weeks, some traffic logs
appear to have internal clients making requests from outside the internal LAN. Based
on the traffic Jason has been seeing, what action should he take?
- A.Throttle network traffic.
- B.Update antivirus definitions.
- C.Implement egress filtering.
- D.Implement ingress filtering
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Throttling network traffic will slow down a potential DoS attack; however, an ingress filter will check for internal addresses coming in from the public side. This is a good indicator of a spoofed IP. |
55.
Which DoS attack sends traffic to the target with a spoofed IP of the target itself?
- A.Land
- B.Smurf
- C.Teardrop
- D.SYN flood
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
A land attack fits this description. Smurf Attacks deal with ICMP echo requests going back to a spoofed target address. SYN floods use custom packets that barrage a target with requests. Teardrop attacks use custom fragmented packets that have overlapping offsets. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40