AFCEH ANSWERS
1.How can you protect your IP Address while Surfing?
- Google Language Translator
- Web Based Proxy
- Proxy Chains
- Any two of the above
- All of the above
2.You receive a phone call on your cell phone from another Indian cell phone number.How can you trace the number?
- There are tools available on the internet that will tell you the state in india where the cell phone is registered.
- You can use Trace Route Tool.
- You can install a firewall on your cell phone,which will record the IP adress of teh other cell phone.
- It depends upon whether you have a post paid or pre paid connection.
- It depends on how faar you are from a cell phone tower.
Ans -1. There are tools available on the internet that will tell you the state in india where the cell phone is registered.
3.What is the countermeasure to Brute Force Password Cracking?
Ans -4. Ensure that CAPTCHA is implemented.
4.How can you steal files from a local machine when you don't know the Windows login password of that machine? Suggest a technique that will attract the least attention from the victim.
Ans -4. Linux LIVE CD.
5.Let us assume you are communicating with two different people A and B.Both A and B on the same remote network.When you try to find out their IP address on your system,can they have the same IP address?
Ans -1. Yes
6.How can an email server detect spoofed emails?
3.What is the countermeasure to Brute Force Password Cracking?
- Ensure that password is long.
- Ensure that password has symbols.
- Ensure that SSL encryption us used for Web application accessing the password.
- Ensure that CAPTCHA is implemented.
- Ensure that digital signature are using.
4.How can you steal files from a local machine when you don't know the Windows login password of that machine? Suggest a technique that will attract the least attention from the victim.
- Password cracking tool.
- Keylogger.
- Data Sniffer.
- Linux LIVE CD.
- Serial Numbers.
5.Let us assume you are communicating with two different people A and B.Both A and B on the same remote network.When you try to find out their IP address on your system,can they have the same IP address?
- Yes
- No.
- Maybe
- Only if they are using a proxy server.
6.How can an email server detect spoofed emails?
- Reverse DNS lookup of the Sender's IP address.
- Map Sender's IP address to domain.
- Blacklist certain sender IP addresses.
- Email header analysis.
- Keyword based filtering.
Ans -2. Map Sender's IP address to domain.
7.What makes the Stacheldraht attack tool so difficult to counter?
Ans -5. All of the above.
8.What is HTTP tunneling?
7.What makes the Stacheldraht attack tool so difficult to counter?
- It uses single key encryption.
- It communicates using ICMP.
- Its default port numbers can be changed.
- It uses a very large number of simultaneous attackers.
- All of the above.
8.What is HTTP tunneling?
- A secure way of communication.
- Working with any protocol transmitting it through http.
- VPN
- None of the above.
Ans -2. Working with any protocol transmitting it through http.
9.How to prevent infection by virus through Facebook?
Ans -3. When you are prompted to download something,do not accept it.
10.Are switching networks vulnerable to sniffers?
9.How to prevent infection by virus through Facebook?
- When an unknown person adds you,do not accept request.
- When an unknown person sends you a private message,do not open it.
- When you are prompted to downlod something,do not accept it.
- When you are to join a group,do not accept it.
- When you are prompted to enter your personal details.
10.Are switching networks vulnerable to sniffers?
- No since only those data packets meant for a host reach the NIC.
- Yes.
- Don't know.
- Depends upon the operating system.
- I searched on Google but could not find the answer.
Ans -2. Yes
11.Whenever you create a new email account or social networking website account or any other online account,why are you asked to re-type some characters that are shown as an image on the website?
Ans -4. To fight spammers and automatic scripts.
12.Decode DOCT to its plaintext format:
13.While trying to change the signature of a Trojan you ended increasing few bytes in the hex file. What will be the result?
Ans -1. The Trojan file will crash altogether.
14.When you use the ipconfig command then your IP address is shown to be X,while when you visit www.whatismyip.com then your Ip address is shown to be Y.Which is your internal IP address and which is your external IP address?
Ans -1. X is Internal,Y is External.
15.Convert ZEBDG into plaintext
Ans -2. AFCEH
16.If you are the system administrator of a college and want to block use of peer to peer file sharing software,then what do you need to do?
Ans -2. Block certain ports.
17.What is most important from below for a sucessful Man in Middle attack?
Ans -3. Sniffed Session ID.
18.What is a good countermeasure against Land attacks?
Ans -1. Patch your Operating System.
19.Which of the below is the most foolproof technique for regulating access to a file on a local system?
Ans -4. USB Dongle.
20.What is the main difference between Ophcrack and Offline NTPassword and Registry Editor?
Ans -3. Ophcrack cracks the password,Offline resets the password.
21.Decode CNRJG to its plaintext format:
Ans - 4. APPLE
22.How is connection terminated in TCP/IP?
Ans -2. A sends FIN to B.B sends a FIN/ACK to A.A sends an ACK to B.
23.Convert the following text Base64 into its equivalent Base64 Encoded text:
24.Why is it important to password protect the BIOS?
Ans -5. All of the above.
25.If you want to steal the data from a password protected computer,what is the best technique?
Ans -4. Live CD.
26.How can you find whether the target computer is a Honeypot or not?
27.Usually when you port scan your home computer,you will find that some ports are open?Why?
Ans -3. The applications running o your system are using these open ports.
28.How can you find out a remote computer's MAC address?
Ans -3. Data Sniffer.
29.If your company or college is using software to monitor all your activities on your desktop computer,then what can you do to stop the monitoring?
30.In the CAPTCHA system,why are backgrounds of different colors?
Ans -5. To prevent OCR tools from working.
31.You have Norton antivirus installed on your system. You scanned a trojan file and after altering the signature found that it is not being detected by Norton Now you send it to the victim where where it was caught by the antivirus what could be the possible explaination?
Ans -3. The victim is using some other antivirus.
32.Analyze the below email headers and determine the source IP address of the system that was used to send the email :
Ans -1. 69.147.64.132
33.Convert BGDFI into correct plaintext:
Ans -2. AFCEH
34.What are persistent XSS attacks?
11.Whenever you create a new email account or social networking website account or any other online account,why are you asked to re-type some characters that are shown as an image on the website?
- To fight piracy.
- to fight viruses,worms and trojans.
- To prevent users from creating multiple accounts.
- To fight spammers and automatic scripts.
- To ensure that the user can type properly.
12.Decode DOCT to its plaintext format:
- COAT
- BOAT
- DAFT
- MEAT
- SEAT
13.While trying to change the signature of a Trojan you ended increasing few bytes in the hex file. What will be the result?
- The Trojan file will crash altogether.
- The Trojan will work and get undetected by the antivirus.
- Addition of few bytes won't make much difference
- Nothing will happen.It will ignore those bytes.
14.When you use the ipconfig command then your IP address is shown to be X,while when you visit www.whatismyip.com then your Ip address is shown to be Y.Which is your internal IP address and which is your external IP address?
- X is Internal,Y is External.
- Y is Internal,X is External.
- Both are External.
- Depends on whether proxy server is being used or not.
- Depends on whether there is a firewall or not.
15.Convert ZEBDG into plaintext
- Big Guy Dog Fun India
- AFCEH
- ANKIT
- FADIA
- YOURS
16.If you are the system administrator of a college and want to block use of peer to peer file sharing software,then what do you need to do?
- Prevent use of cookies.
- Block certain ports.
- Block certain IP addresses.
- Block certain protocols.
- Block certain keywords.
17.What is most important from below for a sucessful Man in Middle attack?
- Hijack one of the computers.
- Data must pass through your computer.
- Sniffed Session ID.
- Sequence Number Prediction.
- Time out should take place.
18.What is a good countermeasure against Land attacks?
- Patch your Operating System.
- Disable all fake data packets.
- Disable all ports.
- Disable trust relationship based connections.
- All of the above.
19.Which of the below is the most foolproof technique for regulating access to a file on a local system?
- Password protected file.
- Encrypted file.
- Mounted Virtual Encrypted Drive.
- USB Dongle.
- Virtual Keyboard.
20.What is the main difference between Ophcrack and Offline NTPassword and Registry Editor?
- Ophcrack is slow,Offline is fast
- Ophcrack changes the password,Offline resets the password.
- Ophcrack cracks the password,Offline resets the password.
- Ophcrack resets the password,Offline cracks the password.
- Ophcrack changes the password,Offline cracks the password
21.Decode CNRJG to its plaintext format:
- AFCEH
- ANKIT
- FADIA
- APPLE
- ALONE
22.How is connection terminated in TCP/IP?
- A sends FIN/ACK to B.B sends a FIN/ACK to A.A sends an ACK to B.
- A sends FIN to B.B sends a FIN/ACK to A.A sends an ACK to B.
- A sends FIN to B.B sends a FIN to A.A sends an ACK to B.
- A sends FIN to B.B sends an ACK to A.A sends an ACK to B.
- A sends FIN/ACK to B.B sends an ACK to A.A sends an ACK to B.
23.Convert the following text Base64 into its equivalent Base64 Encoded text:
- QmFzZTY0
- QmFzZTY1
- QmFzZTY2
- QmFzZTY3
- QmFzZTY5
24.Why is it important to password protect the BIOS?
- To prevent data theft.
- To prevent passwords getting cracked.
- To prevent systems settings from being changed
- To prevent virus infection.
- All of the above.
25.If you want to steal the data from a password protected computer,what is the best technique?
- Brute Force.
- InstallData Sniffer on another computer on same network.
- War Driving.
- Live CD.
- Trojans.
26.How can you find whether the target computer is a Honeypot or not?
- Nmap
- ICMP Scanning
- Ping Sweeping
- Manual Hit & Trial
- Honeypotscan.pl
27.Usually when you port scan your home computer,you will find that some ports are open?Why?
- There are daemons running on these open ports.
- There are Trojans,spyware and keyloggers installed on these open ports.
- The applications running o your system are using these open ports.
- An attacker might be connecting to your system.
- I don't know.
28.How can you find out a remote computer's MAC address?
- Windows Registry.
- Netstat.
- Data Sniffer.
- Etherchange tool.
- Ping.
29.If your company or college is using software to monitor all your activities on your desktop computer,then what can you do to stop the monitoring?
- Disable the Firewall
- Disable the Sniffer.
- Disable the Trojan.
- Use Encryption.
- HTTP Tunnelling
30.In the CAPTCHA system,why are backgrounds of different colors?
- To prevent Brute Force cracking.
- To prevent spam.
- To prevent spoofing.
- To prevent sniffing tools.
- To prevent OCR tools from working.
31.You have Norton antivirus installed on your system. You scanned a trojan file and after altering the signature found that it is not being detected by Norton Now you send it to the victim where where it was caught by the antivirus what could be the possible explaination?
- Your antivirus is not workng properly.
- Your antivirus is not properly updated.
- The victim is using some other antivirus.
- There has been a binary editor in teh transit making teh fiel detectable again.
32.Analyze the below email headers and determine the source IP address of the system that was used to send the email :
- 69.147.64.132
- 66.218.66.82
- 216.252.122.217
- 61.1.127.224
- 66.218.66.82
33.Convert BGDFI into correct plaintext:
- Big Guy Dog Fun India
- AFCEH
- ANKIT
- FADIA
- YOURS
34.What are persistent XSS attacks?
- When the XSS attack continues for a long period of time.
- When the XSS attack continues on multiple servers.
- When the data entered by the attacker gets stored on the target and can be accessed later as well.
- When the data by the attacker infects other computers on the same network
Ans -4. When the data by the attacker infects other computers on the same network.
35.If you want to prevent malicious attacks (that originate inside your network) from leaving your network,then what would you recommend?
Ans -1. Software based Firewall.
36.Imagine that you are working in an organization.You use Endora Pro to acess your email.If you are quitting you job nad want a copy of all your emails,then what is teh best thing to do?
Ans -4. Copy the Eudora Pro folder.
37.What is a good countermeasure to phishing?
38.Whats is the correct way to use p0f when target system is www.abc.com?
Ans -3. Run p0f and then ping www.abc.com.
39.If you wish to commit a perfect a cyber crime,then which of the following would do?
Ans -4. All of the above.
40.A criminal sends you an email.You use email header analysis and traceroute to trace the IP address of the criminal.Which of the following statements is true?
Ans -4. All of the above could be true.
41.How can you detect that a SYN Flood attack is taking place?
Ans -1. netstat
42.Convert 101001101100100001 into plaintext form:
Ans -1. 170785
43.If you have physical access to a Windows system which has a login password,then what is the fastest & most efficient way to steal data from the local hard drive?
Ans -3. Boot into Unix Live CD.
44.How can you protect yourself against Clipboard theft while visiting websites?
Ans -3. Disable Scripting Languages.
45.Why do you think array bound checking on input is an important aspect of secure programming?
Ans -1. Protects against Integer Overflows.
46.For a website,what is the best way to protect their visitors from key loggers?
35.If you want to prevent malicious attacks (that originate inside your network) from leaving your network,then what would you recommend?
- Software based Firewall.
- Hardware based Firewall.
- Data Sniffer.
- Reverse DNS Trace.
- Proxy Server
36.Imagine that you are working in an organization.You use Endora Pro to acess your email.If you are quitting you job nad want a copy of all your emails,then what is teh best thing to do?
- Forward all emails to your personal account.
- Copy and paste the tect from your email sto a word file.
- Connect your personal computer to the mail server and download all emails to it.
- Copy the Eudora Pro folder.
- Copy the Systems folder.
37.What is a good countermeasure to phishing?
- Firewall
- URL ANalysis
- Hardware Device.
- Awarness.
- Digital Certificate of the page.
38.Whats is the correct way to use p0f when target system is www.abc.com?
- Run p0f and the visit www.hotmail.com.
- Run p0f and then trace route to www.abc.com.
- Run p0f and then ping www.abc.com.
- Visit www.abc.com and then run p0f.
- Ping www.abc.xom and then run p0f.
39.If you wish to commit a perfect a cyber crime,then which of the following would do?
- Spoof your MAC address.
- Connect to a proxy server.
- Use an Internet Cafe.
- All of the above.
- Any two of the first three options.
40.A criminal sends you an email.You use email header analysis and traceroute to trace the IP address of the criminal.Which of the following statements is true?
- The IP address is registered to the criminal.
- The IP address is registered to the ISP of the criminal.
- The IP address is registered to the company where the criminal works.
- All of the above could be true.
- Any two from the first three options could be true.
41.How can you detect that a SYN Flood attack is taking place?
- netstat
- ipconfig
- firewall
- fport
- Honeypot
42.Convert 101001101100100001 into plaintext form:
- 170785
- 240585
- 160685
- 121285
- 01018
43.If you have physical access to a Windows system which has a login password,then what is the fastest & most efficient way to steal data from the local hard drive?
- Crack the Windows login password.
- Do a security audit&hack into system from internal network.
- Boot into Unix Live CD.
- Use Biometric Cracks.
- Steal HDD physically.
44.How can you protect yourself against Clipboard theft while visiting websites?
- Zone Alarm Firewall.
- Update your browser.
- Disable Scripting Languages.
- Update Microsoft Windows.
- Use a good Antivirus.
45.Why do you think array bound checking on input is an important aspect of secure programming?
- Protects against Integer Overflows.
- Protects against Format String Overflow.
- Protects against Cross Site Scripting Attack.
- Protects against SQL Injection.
- Protects against piracy.
46.For a website,what is the best way to protect their visitors from key loggers?
- Antivirus Software.
- Highest Browser Security Settings.
- Antispyware software.
- Secure Auditing.
- Virtual Keylogger.
47.When you telnet to the POP port on the target computer,which port you could be connecting to?
Ans -5. All of the above.
48.How can you find the most visited websites on the network?
49.Which of the below is the most foolproof technique of detecting a cookie tracker?
Ans -3. Tripwire
50.When you port scan a target system,the port scanner shows that the ports:15,79,110,443 are open.What does that mean?
Ans -3. Other ports could be open too.
- Port 110 or Port 25
- Port 80 or Prot 1110
- Port 8080 or Port 1234
- One of the above.
- All of the above.
48.How can you find the most visited websites on the network?
- Untangle
- Zone Alarm
- www.anonymizer.com
- Snort
- Tripwire
49.Which of the below is the most foolproof technique of detecting a cookie tracker?
- Antivirus
- PrevX
- Tripwire
- Mozilla
- Firewall
50.When you port scan a target system,the port scanner shows that the ports:15,79,110,443 are open.What does that mean?
- Port 15,79,110 and 443 are open.
- Port 15,79,110 and 443 are closed.
- Other ports could be open too.
- Target system is running a Windows based platform.