Test 2 Information Security
Test 2 Information Security
1.- The phrase that best summarizes the purpose of the ISO/IEC 27001 standard is:
a) Always check security
b) Organize information security
c) What do we want to protect?
d) A checklist for security verification
3.- An attack on the network that is carried out to gather information about possible entry points to the
network, is called:
a) Intrusion
b) Scanning
c) Sniffing
d) Phishing
6.- A poor definition of passwords increases the chances of success for what type of attack?
a) Dictionary-based attacks
b) Brute force attacks
c) Attack by password vulnerability detection
d) There are no weak passwords
9.- The confidentiality and authenticity of messages exchanged in a secure internet session
enabled by the use of:
an antivirus
b) SSL
c) A pop-up blocker
a firewall
10.- Security management over time includes (choose 3)
a) Achieve security
b) Analyze security risks
c) Maintain security
d) Evaluate the security
e) Institutionalize security aspects
11. The following diagram shows an attack that corresponds to the type:
a) Interception
b) Modification
c) Interruption
d) Manufacturing
12. The attack on the security of the Manufacturing type is an attack on the __________ of the data
a) Authenticity
availability
c) confidentiality
d) integrity
13.- The THC-HYDRA software performs password cracking based on attacks of the type
(Choose 2)
a) Heuristics
b) brute force
c) Dictionary
d) Procedural
excessive force
14. The traceroute tool provides a system to trace the flow of traffic through
A network. What combination of protocols does it use for this? (Choose 3)
a) TCP
b) UDP
c) ICMP
d) PING
e) IP
f) ARP
17. After a scan with NMAP, you can obtain information about (Choose 3)
a) A list of open ports
b) TCP sequence numbers
c) Quality of user passwords on the network
d) Remote operating systems
e) Content of the packets transmitted over the network
18. After running NMAP with the -sS option, the following diagram is presented.
interaction, What can be said about this result? (Choose 2)
19. The two software components required for the execution of NESSUS are (Choose 2)
a) The NESSUS demon: nessusd
b) The NESSUS user account, provided via nessus-adduser
c) The client NESSUS: nessus
d) The NESSUS Attack Scripting Language: NASL
22. Which of the following are possible port states recognized by NMAP? (Choose 3)
Open-Filtered
b) Closed-Filtered
c) Unknown
d) Filtering
Unconditional
23. Regarding the relationship between security services and security mechanisms
it can be said:
a) Security services make use of one or more security mechanisms to
provide the service
b) Security mechanisms use one or more security services for the
implementation of the mechanism
c) According to ITU-T X.800, security services are independent of mechanisms.
of security
a) Symmetric cipher
b) Private key encryption
c) Public key encryption
d) Asymmetric encryption
25. There are two requirements for the safe use of symmetric encryption, these are (Choose 2):
a) A known and robust encryption algorithm
b) A public encryption key for the sender and a private encryption key
for the receiver
c) Sender and receiver must have obtained copies of the secret key securely.
d) That the keys are generated randomly
30. The ifconfig command in UNIX/LINUX is used to properly configure the interfaces.
From our system's network, ifconfig can be used to detect abnormal operation.
from the network card, which of the following could be considered functionalities
anomalous? (Choose 3):
a) Incorrect IP address
b) Incorrect MAC address
c) Duplicate IP address
d) Network card in promiscuous mode
e) Network card without MAC address
31.- To know which ports are being used by the clients we are running. Which
Which of the following commands and their options can we use? (Choose 2)
a) netstat -a
b) scanning -sT of NMAP
c) netstat -p
d) netstat -r
e) scanning –sS of NMAP
32. Which of the following statements best describes the functioning of NESSUS?
a) NESSUS checks the connection status with one or more remote devices by means of
the echo request and echo reply packets (defined in the ICMP network protocol)
b) NESSUS detects vulnerabilities according to the insecure.org list and then exploits them.
the vulnerabilities through the respective exploits.
c) NESSUS starts by scanning the ports with NMAP to look for open ports, then it
open ports are attacked through various vulnerability tests
d) NESSUS uses TCP and UDP packets to search for vulnerabilities associated with the ports
open
33. What type of VPN connection does the following figure correspond to?
34. Malicious software (or MALWARE) that impersonates DNS in the local host file to lead us to
a fake website is called:
Trojan
b) Adware
c) Pharming
d) Phishing
36.- A poor password definition increases the likelihood of success of what type of attack?
e) Dictionary-based attacks
f) Brute force attacks
g) Attack through password vulnerability detection
h) There are no weak passwords
37. If we want to block the TCP packets used to initiate a connection, which of the following rules
Should it be added to IPTABLES?
a) iptables -A INPUT -j REJECT
b) iptables -A INPUT -p tcp -j REJECT
c) iptables -A INPUT -p tcp --syn -j REJECT
d) iptables -A INPUT -m state --state ESTABLISHED -j REJECT
38.- ISO/IEC 27001 is an international standard that sets requirements related to:
e) Information Security Management Systems ISMS
f) The groups of information security specialists in the organization
g) The company's director and the company's IT specialists
h) The decision-makers of each part of the company
39. Which of the following security attacks are considered active attacks?
a) Port scanning or tracing
b) Monitor the network traffic
c) Obtain the content of a message
d) Modify the content of a message
40. The ________________ refers to the assurance that the information has not been altered or deleted.
copied, etc., well during the transmission process or on your own source equipment.
a) Confidentiality
Efficiency
c) Integrity
d) Availability