During a routine security inspection of the clients in your network, you find a program called
cgiscan.c on one of the computers. You investigate the file, reading part of the contents. Using the
portion of the program shown below, identify the function of the program. Temp[1] = "GET /cgi-
bin/phf HTTP/1.0\n\n"; Temp[2] = "GET /cgi-bin/Count.cgi HTTP/1.0\n\n"; Temp[3] = "GET /cgi-
bin/test-cgi HTTP/1.0\n\n"; Temp[4] = "GET /cgi-bin/php.cgi HTTP/1.0\n\n"; Temp[5] = "GET /cgi-
bin/handler HTTP/1.0\n\n"; Temp[6] = "GET /cgi-bin/webgais HTTP/1.0\n\n"; Temp[7] = "GET /cgi-
bin/websendmail HTTP/1.0\n\n";
E
When using multiple alphabets, what type of cipher is being used?
A
DES is often defined as no longer "secure enough" to handle high security requirements. Why is this?
E
Your organization assigns an Annual Loss Expectancy to assets during a risk analysis meeting. You
have a server which if down for a day will lose the company $35,000, and has a serious root access
attack against it once per month. What is the ALE for this attack against this server?
E
While configuring TCP Wrappers on your Linux system, you desire to create a line that will effect the
single host 10.20.23.45 accessing the telnet service. Which of the following lines will achieve this
desired result?
E
Which three of the following are examples of the reason that Message Authentication is needed?
B, C, E
Which two of the following are factors that must be considered in determining the likelihood of
occurrence during a risk analysis review?
C, D
Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use
Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what
type of traffic did Snort capture in this log file?
E
You have been given the task of writing your organization's security policy. During your research you
find that there are several established standards for security policy design. Which of the following are
accepted standards?
A, D
To maintain the security of your network you routinely run several checks of the network and
computers. Often you use the built-in tools, such as netstat.If you run the following command,
netstat -s which of the following will be the result?
E