{\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff0\deff0\stshfdbch12\stshfloch0\stshfhich0\stshfbi0\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f1\fbidi \fswiss\fcharset0\fprq2{\*\panose 020b0604020202020204}Arial;}
{\f2\fbidi \fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}{\f12\fbidi \froman\fcharset129\fprq2{\*\panose 02030600000101010101}Batang{\*\falt \'a1\'cb\'a2\'e7E\'a2\'aeEc\'a2\'aeE\'a1\'cbc\'a1\'cb\'a2\'e7\'a1\'cb?IoUAA};}
{\f34\fbidi \froman\fcharset1\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \froman\fcharset129\fprq2{\*\panose 00000000000000000000}@Batang;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}
{\fdbmajor\f31501\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fhimajor\f31502\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}
{\fbimajor\f31503\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\flominor\f31504\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}
{\fdbminor\f31505\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fhiminor\f31506\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}
{\fbiminor\f31507\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f40\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\f41\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}
{\f43\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\f44\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\f45\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\f46\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}
{\f47\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\f48\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\f50\fbidi \fswiss\fcharset238\fprq2 Arial CE;}{\f51\fbidi \fswiss\fcharset204\fprq2 Arial Cyr;}
{\f53\fbidi \fswiss\fcharset161\fprq2 Arial Greek;}{\f54\fbidi \fswiss\fcharset162\fprq2 Arial Tur;}{\f55\fbidi \fswiss\fcharset177\fprq2 Arial (Hebrew);}{\f56\fbidi \fswiss\fcharset178\fprq2 Arial (Arabic);}
{\f57\fbidi \fswiss\fcharset186\fprq2 Arial Baltic;}{\f58\fbidi \fswiss\fcharset163\fprq2 Arial (Vietnamese);}{\f60\fbidi \fmodern\fcharset238\fprq1 Courier New CE;}{\f61\fbidi \fmodern\fcharset204\fprq1 Courier New Cyr;}
{\f63\fbidi \fmodern\fcharset161\fprq1 Courier New Greek;}{\f64\fbidi \fmodern\fcharset162\fprq1 Courier New Tur;}{\f65\fbidi \fmodern\fcharset177\fprq1 Courier New (Hebrew);}{\f66\fbidi \fmodern\fcharset178\fprq1 Courier New (Arabic);}
{\f67\fbidi \fmodern\fcharset186\fprq1 Courier New Baltic;}{\f68\fbidi \fmodern\fcharset163\fprq1 Courier New (Vietnamese);}
{\f162\fbidi \froman\fcharset0\fprq2 Batang Western{\*\falt \'a1\'cb\'a2\'e7E\'a2\'aeEc\'a2\'aeE\'a1\'cbc\'a1\'cb\'a2\'e7\'a1\'cb?IoUAA};}
{\f160\fbidi \froman\fcharset238\fprq2 Batang CE{\*\falt \'a1\'cb\'a2\'e7E\'a2\'aeEc\'a2\'aeE\'a1\'cbc\'a1\'cb\'a2\'e7\'a1\'cb?IoUAA};}
{\f161\fbidi \froman\fcharset204\fprq2 Batang Cyr{\*\falt \'a1\'cb\'a2\'e7E\'a2\'aeEc\'a2\'aeE\'a1\'cbc\'a1\'cb\'a2\'e7\'a1\'cb?IoUAA};}
{\f163\fbidi \froman\fcharset161\fprq2 Batang Greek{\*\falt \'a1\'cb\'a2\'e7E\'a2\'aeEc\'a2\'aeE\'a1\'cbc\'a1\'cb\'a2\'e7\'a1\'cb?IoUAA};}
{\f164\fbidi \froman\fcharset162\fprq2 Batang Tur{\*\falt \'a1\'cb\'a2\'e7E\'a2\'aeEc\'a2\'aeE\'a1\'cbc\'a1\'cb\'a2\'e7\'a1\'cb?IoUAA};}
{\f167\fbidi \froman\fcharset186\fprq2 Batang Baltic{\*\falt \'a1\'cb\'a2\'e7E\'a2\'aeEc\'a2\'aeE\'a1\'cbc\'a1\'cb\'a2\'e7\'a1\'cb?IoUAA};}{\f432\fbidi \froman\fcharset0\fprq2 @Batang Western;}{\f430\fbidi \froman\fcharset238\fprq2 @Batang CE;}
{\f431\fbidi \froman\fcharset204\fprq2 @Batang Cyr;}{\f433\fbidi \froman\fcharset161\fprq2 @Batang Greek;}{\f434\fbidi \froman\fcharset162\fprq2 @Batang Tur;}{\f437\fbidi \froman\fcharset186\fprq2 @Batang Baltic;}
{\flomajor\f31508\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\flomajor\f31509\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\flomajor\f31511\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}
{\flomajor\f31512\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\flomajor\f31513\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\flomajor\f31514\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}
{\flomajor\f31515\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\flomajor\f31516\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\fdbmajor\f31518\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}
{\fdbmajor\f31519\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\fdbmajor\f31521\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\fdbmajor\f31522\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}
{\fdbmajor\f31523\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\fdbmajor\f31524\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\fdbmajor\f31525\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}
{\fdbmajor\f31526\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\fhimajor\f31528\fbidi \froman\fcharset238\fprq2 Cambria CE;}{\fhimajor\f31529\fbidi \froman\fcharset204\fprq2 Cambria Cyr;}
{\fhimajor\f31531\fbidi \froman\fcharset161\fprq2 Cambria Greek;}{\fhimajor\f31532\fbidi \froman\fcharset162\fprq2 Cambria Tur;}{\fhimajor\f31535\fbidi \froman\fcharset186\fprq2 Cambria Baltic;}
{\fhimajor\f31536\fbidi \froman\fcharset163\fprq2 Cambria (Vietnamese);}{\fbimajor\f31538\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\fbimajor\f31539\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}
{\fbimajor\f31541\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\fbimajor\f31542\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\fbimajor\f31543\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}
{\fbimajor\f31544\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\fbimajor\f31545\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\fbimajor\f31546\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}
{\flominor\f31548\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\flominor\f31549\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\flominor\f31551\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}
{\flominor\f31552\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\flominor\f31553\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\flominor\f31554\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}
{\flominor\f31555\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\flominor\f31556\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\fdbminor\f31558\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}
{\fdbminor\f31559\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\fdbminor\f31561\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\fdbminor\f31562\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}
{\fdbminor\f31563\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\fdbminor\f31564\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\fdbminor\f31565\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}
{\fdbminor\f31566\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\fhiminor\f31568\fbidi \fswiss\fcharset238\fprq2 Calibri CE;}{\fhiminor\f31569\fbidi \fswiss\fcharset204\fprq2 Calibri Cyr;}
{\fhiminor\f31571\fbidi \fswiss\fcharset161\fprq2 Calibri Greek;}{\fhiminor\f31572\fbidi \fswiss\fcharset162\fprq2 Calibri Tur;}{\fhiminor\f31575\fbidi \fswiss\fcharset186\fprq2 Calibri Baltic;}
{\fhiminor\f31576\fbidi \fswiss\fcharset163\fprq2 Calibri (Vietnamese);}{\fbiminor\f31578\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\fbiminor\f31579\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}
{\fbiminor\f31581\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\fbiminor\f31582\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\fbiminor\f31583\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}
{\fbiminor\f31584\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\fbiminor\f31585\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\fbiminor\f31586\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}}
{\colortbl;\red0\green0\blue0;\red0\green0\blue255;\red0\green255\blue255;\red0\green255\blue0;\red255\green0\blue255;\red255\green0\blue0;\red255\green255\blue0;\red255\green255\blue255;\red0\green0\blue128;\red0\green128\blue128;\red0\green128\blue0;
\red128\green0\blue128;\red128\green0\blue0;\red128\green128\blue0;\red128\green128\blue128;\red192\green192\blue192;}{\*\defchp \fs22\dbch\af12 }{\*\defpap \ql \li0\ri0\sa200\sl276\slmult1
\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 }\noqfpromote {\stylesheet{\ql \li0\ri0\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 \rtlch\fcs1 \af0\afs24\alang1025 \ltrch\fcs0
\fs24\lang1033\langfe1042\loch\f0\hich\af0\dbch\af12\cgrid\langnp1033\langfenp1042 \snext0 \sqformat \spriority0 Normal;}{\*\cs10 \additive \ssemihidden Default Paragraph Font;}{\*
\ts11\tsrowd\trftsWidthB3\trpaddl108\trpaddr108\trpaddfl3\trpaddft3\trpaddfb3\trpaddfr3\trcbpat1\trcfpat1\tblind0\tblindtype3\tsvertalt\tsbrdrt\tsbrdrl\tsbrdrb\tsbrdrr\tsbrdrdgl\tsbrdrdgr\tsbrdrh\tsbrdrv \ql \li0\ri0\sa200\sl276\slmult1
\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 \rtlch\fcs1 \af0\afs22\alang1025 \ltrch\fcs0 \fs22\lang1033\langfe1033\loch\f0\hich\af0\dbch\af12\cgrid\langnp1033\langfenp1033 \snext11 \ssemihidden \sunhideused Normal Table;}{\*
\cs15 \additive \rtlch\fcs1 \af0 \ltrch\fcs0 \ul\cf2 \sbasedon10 \styrsid9380237 Hyperlink;}}{\*\listtable{\list\listtemplateid1967177038\listhybrid{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat50\levelspace0\levelindent0
{\leveltext\leveltemplateid1334894074\'02\'00.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fbias0 \fi-540\li900\jclisttab\tx900\lin900 }{\listlevel\levelnfc4\levelnfcn4\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0
{\leveltext\leveltemplateid67698713\'02\'01.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li1440\jclisttab\tx1440\lin1440 }{\listlevel\levelnfc2\levelnfcn2\leveljc2\leveljcn2\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698715\'02\'02.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-180\li2160\jclisttab\tx2160\lin2160 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698703\'02\'03.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li2880\jclisttab\tx2880\lin2880 }{\listlevel\levelnfc4\levelnfcn4\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698713\'02\'04.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li3600\jclisttab\tx3600\lin3600 }{\listlevel\levelnfc2\levelnfcn2\leveljc2\leveljcn2\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698715\'02\'05.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-180\li4320\jclisttab\tx4320\lin4320 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698703\'02\'06.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li5040\jclisttab\tx5040\lin5040 }{\listlevel\levelnfc4\levelnfcn4\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698713\'02\'07.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li5760\jclisttab\tx5760\lin5760 }{\listlevel\levelnfc2\levelnfcn2\leveljc2\leveljcn2\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698715\'02\'08.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-180\li6480\jclisttab\tx6480\lin6480 }{\listname ;}\listid292713430}{\list\listtemplateid-147956688\listhybrid{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0
\levelfollow0\levelstartat49\levelspace0\levelindent0{\leveltext\leveltemplateid-673409256\'02\'00.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fbias0 \fi-600\li960\jclisttab\tx960\lin960 }{\listlevel\levelnfc4\levelnfcn4\leveljc0\leveljcn0
\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\leveltemplateid67698713\'02\'01.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li1440\jclisttab\tx1440\lin1440 }{\listlevel\levelnfc2\levelnfcn2\leveljc2\leveljcn2\levelfollow0
\levelstartat1\levelspace0\levelindent0{\leveltext\leveltemplateid67698715\'02\'02.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-180\li2160\jclisttab\tx2160\lin2160 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1
\levelspace0\levelindent0{\leveltext\leveltemplateid67698703\'02\'03.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li2880\jclisttab\tx2880\lin2880 }{\listlevel\levelnfc4\levelnfcn4\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0
\levelindent0{\leveltext\leveltemplateid67698713\'02\'04.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li3600\jclisttab\tx3600\lin3600 }{\listlevel\levelnfc2\levelnfcn2\leveljc2\leveljcn2\levelfollow0\levelstartat1\levelspace0\levelindent0
{\leveltext\leveltemplateid67698715\'02\'05.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-180\li4320\jclisttab\tx4320\lin4320 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698703\'02\'06.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li5040\jclisttab\tx5040\lin5040 }{\listlevel\levelnfc4\levelnfcn4\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698713\'02\'07.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li5760\jclisttab\tx5760\lin5760 }{\listlevel\levelnfc2\levelnfcn2\leveljc2\leveljcn2\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698715\'02\'08.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-180\li6480\jclisttab\tx6480\lin6480 }{\listname ;}\listid1005551252}{\list\listtemplateid1378279270\listhybrid{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0
\levelfollow0\levelstartat46\levelspace0\levelindent0{\leveltext\leveltemplateid2082872938\'02\'00.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fbias0 \fi-540\li900\jclisttab\tx900\lin900 }{\listlevel\levelnfc4\levelnfcn4\leveljc0\leveljcn0
\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\leveltemplateid67698713\'02\'01.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li1440\jclisttab\tx1440\lin1440 }{\listlevel\levelnfc2\levelnfcn2\leveljc2\leveljcn2\levelfollow0
\levelstartat1\levelspace0\levelindent0{\leveltext\leveltemplateid67698715\'02\'02.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-180\li2160\jclisttab\tx2160\lin2160 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1
\levelspace0\levelindent0{\leveltext\leveltemplateid67698703\'02\'03.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li2880\jclisttab\tx2880\lin2880 }{\listlevel\levelnfc4\levelnfcn4\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0
\levelindent0{\leveltext\leveltemplateid67698713\'02\'04.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li3600\jclisttab\tx3600\lin3600 }{\listlevel\levelnfc2\levelnfcn2\leveljc2\leveljcn2\levelfollow0\levelstartat1\levelspace0\levelindent0
{\leveltext\leveltemplateid67698715\'02\'05.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-180\li4320\jclisttab\tx4320\lin4320 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698703\'02\'06.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li5040\jclisttab\tx5040\lin5040 }{\listlevel\levelnfc4\levelnfcn4\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698713\'02\'07.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li5760\jclisttab\tx5760\lin5760 }{\listlevel\levelnfc2\levelnfcn2\leveljc2\leveljcn2\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698715\'02\'08.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-180\li6480\jclisttab\tx6480\lin6480 }{\listname ;}\listid1810048555}{\list\listtemplateid1988902162\listhybrid{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0
\levelfollow0\levelstartat46\levelspace0\levelindent0{\leveltext\leveltemplateid67698703\'02\'00.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fbias0 \fi-360\li720\jclisttab\tx720\lin720 }{\listlevel\levelnfc4\levelnfcn4\leveljc0\leveljcn0
\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\leveltemplateid67698713\'02\'01.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li1440\jclisttab\tx1440\lin1440 }{\listlevel\levelnfc2\levelnfcn2\leveljc2\leveljcn2\levelfollow0
\levelstartat1\levelspace0\levelindent0{\leveltext\leveltemplateid67698715\'02\'02.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-180\li2160\jclisttab\tx2160\lin2160 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1
\levelspace0\levelindent0{\leveltext\leveltemplateid67698703\'02\'03.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li2880\jclisttab\tx2880\lin2880 }{\listlevel\levelnfc4\levelnfcn4\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0
\levelindent0{\leveltext\leveltemplateid67698713\'02\'04.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li3600\jclisttab\tx3600\lin3600 }{\listlevel\levelnfc2\levelnfcn2\leveljc2\leveljcn2\levelfollow0\levelstartat1\levelspace0\levelindent0
{\leveltext\leveltemplateid67698715\'02\'05.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-180\li4320\jclisttab\tx4320\lin4320 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698703\'02\'06.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li5040\jclisttab\tx5040\lin5040 }{\listlevel\levelnfc4\levelnfcn4\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698713\'02\'07.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-360\li5760\jclisttab\tx5760\lin5760 }{\listlevel\levelnfc2\levelnfcn2\leveljc2\leveljcn2\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
\leveltemplateid67698715\'02\'08.;}{\levelnumbers\'01;}\rtlch\fcs1 \af0 \ltrch\fcs0 \fi-180\li6480\jclisttab\tx6480\lin6480 }{\listname ;}\listid1829662765}}{\*\listoverridetable{\listoverride\listid1810048555\listoverridecount0\ls1}
{\listoverride\listid1829662765\listoverridecount0\ls2}{\listoverride\listid1005551252\listoverridecount0\ls3}{\listoverride\listid292713430\listoverridecount0\ls4}}{\*\rsidtbl \rsid211123\rsid351655\rsid409923\rsid662160\rsid721325\rsid935364\rsid1011245
\rsid1140520\rsid1720340\rsid1850839\rsid1858696\rsid2178995\rsid2240904\rsid2311873\rsid2316032\rsid2367714\rsid2373383\rsid2563773\rsid2575608\rsid2632282\rsid2648091\rsid2695924\rsid2844724\rsid2952270\rsid3033347\rsid3368493\rsid3416958\rsid3426064
\rsid3634421\rsid3875234\rsid3883114\rsid4159661\rsid4350168\rsid4468625\rsid4482737\rsid4534742\rsid4539820\rsid4543516\rsid4546837\rsid4609530\rsid4742800\rsid4800219\rsid4938721\rsid4939730\rsid4995980\rsid5002355\rsid5143660\rsid5181619\rsid5247806
\rsid5248763\rsid5325879\rsid5445750\rsid6032389\rsid6059609\rsid6165262\rsid6247127\rsid6252008\rsid6625200\rsid6692031\rsid6759917\rsid6846992\rsid7043674\rsid7215907\rsid7423200\rsid7548511\rsid7632373\rsid7874706\rsid8017173\rsid8023322\rsid8213046
\rsid8737575\rsid8857040\rsid9046822\rsid9314418\rsid9380237\rsid9454315\rsid9918739\rsid10364937\rsid10378238\rsid10648285\rsid10694955\rsid10755747\rsid11278482\rsid11420058\rsid11540671\rsid11673316\rsid12060966\rsid12144379\rsid12465016\rsid12483756
\rsid12522614\rsid12535208\rsid12588345\rsid12786307\rsid13241902\rsid14040245\rsid14040290\rsid14056839\rsid14178935\rsid14447918\rsid14498309\rsid14764829\rsid15105287\rsid15296790\rsid15626152\rsid15877312\rsid15931312\rsid16070304\rsid16136886
\rsid16140005}{\mmathPr\mmathFont34\mbrkBin0\mbrkBinSub0\msmallFrac0\mdispDef1\mlMargin0\mrMargin0\mdefJc1\mwrapIndent1440\mintLim0\mnaryLim1}{\info{\title ECSA Study Guide}{\author Sondra Schneider}{\operator Kevin}{\creatim\yr2011\mo11\dy30\hr23\min7}
{\revtim\yr2011\mo11\dy30\hr23\min7}{\printim\yr2007\mo7\dy26\hr11\min23}{\version2}{\edmins1}{\nofpages17}{\nofwords5164}{\nofchars29435}{\*\company Security University}{\nofcharsws34530}{\vern49273}}{\*\xmlnstbl {\xmlns1 http://schemas.microsoft.com/off
ice/word/2003/wordml}{\xmlns2 urn:schemas-microsoft-com:office:smarttags}}\paperw12240\paperh15840\margl1800\margr1800\margt1440\margb1440\gutter0\ltrsect
\widowctrl\ftnbj\aenddoc\trackmoves0\trackformatting1\donotembedsysfont0\relyonvml0\donotembedlingdata1\grfdocevents0\validatexml0\showplaceholdtext0\ignoremixedcontent0\saveinvalidxml0\showxmlerrors0\noxlattoyen
\expshrtn\noultrlspc\dntblnsbdb\nospaceforul\hyphcaps0\horzdoc\dghspace120\dgvspace120\dghorigin1701\dgvorigin1984\dghshow0\dgvshow3\jcompress\viewkind1\viewscale120\nolnhtadjtbl\rsidroot721325 \fet0{\*\wgrffmtfilter 013f}\ilfomacatclnup0\ltrpar
\sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\*\pnseclvl1\pnucrm\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl2\pnucltr\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl3\pndec\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl4
\pnlcltr\pnstart1\pnindent720\pnhang {\pntxta )}}{\*\pnseclvl5\pndec\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{\*\pnseclvl6\pnlcltr\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{\*\pnseclvl7\pnlcrm\pnstart1\pnindent720\pnhang {\pntxtb (}
{\pntxta )}}{\*\pnseclvl8\pnlcltr\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{\*\pnseclvl9\pnlcrm\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}\pard\plain \ltrpar\ql \li0\ri0\nowidctlpar
\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin0\itap0 \rtlch\fcs1 \af0\afs24\alang1025 \ltrch\fcs0
\fs24\lang1033\langfe1042\loch\af0\hich\af0\dbch\af12\cgrid\langnp1033\langfenp1042 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 ECSA Study Guide
\par --------------------------------
\par
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 1. Simplifying risk include\hich\af2\dbch\af12\loch\f2 s identifying risk itself, asset value, vulnerability and:
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Cost of Impact
\par \hich\af2\dbch\af12\loch\f2 Backup Solutions
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2632282 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 Perceived Threat }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Managerial Functions
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 2. The four typical network security policies can be classified as prudent, permissive, promiscuous an\hich\af2\dbch\af12\loch\f2 d:
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Prominent
\par \hich\af2\dbch\af12\loch\f2 Pervasive
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2632282 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 Paranoid }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Pre-emptive
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 3.What is the definition of a grey hat?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Reformed Black Hat
\par \hich\af2\dbch\af12\loch\f2 A former network administrator
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4995980 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 A white hat who at certain time breaks ethics for his/her own agenda *
\par \hich\af2\dbch\af12\loch\f2 A perso\hich\af2\dbch\af12\loch\f2 n who is tries to exploit weaknesses in systems who is not technically sophisticated
\par \hich\af2\dbch\af12\loch\f2
\par
\par \hich\af2\dbch\af12\loch\f2 4. An attackers methods are designed to impact confidentiality, availability, integrity, and which of the following?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 file rights
\par \hich\af2\dbch\af12\loch\f2 verification of data
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid1140520 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 use control }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 privacy
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 5. When performing a penetration test which of the following is the most important action to take as you gather data?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 inform system administrators as soon as a vulnerability is found
\par \hich\af2\dbch\af12\loch\f2 make note of the amount of time\hich\af2\dbch\af12\loch\f2 spent on each action
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid1720340 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 create a log of all actions, results, and}{\rtlch\fcs1 \af2\afs20
\ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 findings you have collected }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 avoid interaction with any employees associated to the client you are testing
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 6. When doing a penetration test what is the definition of a race con\hich\af2\dbch\af12\loch\f2 dition?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 a deadline imposed for penetration testing to be completed by
\par \hich\af2\dbch\af12\loch\f2 discovering, documenting, informing, and patching a vulnerability in the most efficient and quickest time possible to avoid exploitation
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3634421 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 when an exploit has to beat a cur\hich\af2\dbch\af12\loch\f2
rently running process or soon to be running process to the creat}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 ion or modification of a file }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 discovering vulnerabilities before system administrators patch them
\par \hich\af2\dbch\af12\loch\f2
\par
\par
\par
\par \hich\af2\dbch\af12\loch\f2
\par
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 7. What is created when a user passes multiple string specif\hich\af2\dbch\af12\loch\f2 iers ( such as %s%s%s%s or %n%n%n%n) to a program as the parameter, possibly resulting in arbitrary code execution?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 a buffer overflow
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3634421 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 a format string vulnerability }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 a memory dump
\par \hich\af2\dbch\af12\loch\f2 a heap stack overflow
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 8. Which of the following produ\hich\af2\dbch\af12\loch\f2 cts cannot be used as a sniffer?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Etherape (}{\rtlch\fcs1 \ab\af1\afs20 \ltrch\fcs0 \b\f1\fs20\cf1\insrsid721325 \hich\af1\dbch\af12\loch\f1 EtherApe}{\rtlch\fcs1 \af1\afs20 \ltrch\fcs0 \f1\fs20\cf1\insrsid721325 \hich\af1\dbch\af12\loch\f1
is a graphical network monitor for Unix }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 )
\par \hich\af2\dbch\af12\loch\f2 TcpDump (}{\rtlch\fcs1 \af1\afs20 \ltrch\fcs0 \f1\fs20\cf1\insrsid721325 \hich\af1\dbch\af12\loch\f1 a tool for network monitoring, protocol debugging and data acquisition)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4546837 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 EtherSnort }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 ButtSniff (actual packet sniffer by Dildog)
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 9\hich\af2\dbch\af12\loch\f2 . When working under SKA(shared key authentication, what is required for authentication?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 a MD5 Hash
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10648285 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 a WEP Key }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 a client/server connection specific gateway
\par \hich\af2\dbch\af12\loch\f2 no buffer fragmentation
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 10. Which one of the following tools cannot be using for OS fingerprinting?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Pof (}{\rtlch\fcs1 \af1\afs20 \ltrch\fcs0 \f1\fs20\cf1\insrsid721325 \hich\af1\dbch\af12\loch\f1 An advanced passive OS/network fingerprinting utility )}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Nmap (}{\rtlch\fcs1 \af1\afs20 \ltrch\fcs0 \f1\fs20\cf1\insrsid721325 \hich\af1\dbch\af12\loch\f1 Free Security Scanner For Network Exploration & Hacking)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid7215907 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 Sing }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Hping2 (}{\rtlch\fcs1 \af1\afs20 \ltrch\fcs0 \f1\fs20\cf1\insrsid721325 \hich\af1\dbch\af12\loch\f1 A network scanner that uses spoofed source address packets)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 11. Which penetration technique uses a traceroute-like IP packet analysis to determine wheter or not a particular packet can pass from an attackers host to a destination host through a packet f\hich\af2\dbch\af12\loch\f2
iltering device?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 p-trace (process tracing tool)
\par \hich\af2\dbch\af12\loch\f2 route hopping (}{\rtlch\fcs1 \af1\afs20 \ltrch\fcs0 \f1\fs20\cf1\insrsid721325 \hich\af1\dbch\af12\loch\f1 Hooks for inband signalling to enable communication with routers along a }{\rtlch\fcs1 \ab\af1\afs20 \ltrch\fcs0
\b\f1\fs20\cf1\insrsid721325 \hich\af1\dbch\af12\loch\f1 route)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4539820 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 firewalking }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 ACL probing (This is just a description of what firewalk does)
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 12. Which of th\hich\af2\dbch\af12\loch\f2 e following is an acceptable use for a vulnerability scanner?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 used as a adequate replacement for a full penetration test
\par \hich\af2\dbch\af12\loch\f2 used to infer the true risk of a vulnerability in relation to your data
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2648091 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 used as a DoS tester }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 used to mitigate risks\hich\af2\dbch\af12\loch\f2 created by vulnerabilities
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 13. Which of the following is not a type of rootkit?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Binary rootkits (Attaches to binary files)
\par \hich\af2\dbch\af12\loch\f2 Kernel rootkits (Attaches to kernel, typically loadable module)
\par \hich\af2\dbch\af12\loch\f2 Library rootkits (Attaches to DLL's)
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid7874706 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 Mime r\hich\af2\dbch\af12\loch\f2 ootkits }{\rtlch\fcs1 \af2\afs20
\ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 14. Which of the following is defined by the following statement: a self-replicating program that spreads by inserting copies of itself into other executable code of documents.
\par \hich\af2\dbch\af12\loch\f2
\par }\pard \ltrpar\ql \li0\ri0\sb100\sa100\nowidctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 Trojan (}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid721325 \hich\af0\dbch\af12\loch\f0
a }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\insrsid721325 \hich\af0\dbch\af12\loch\f0 Trojan}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid721325 \hich\af0\dbch\af12\loch\f0 horse is a malicious program)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\par \hich\af2\dbch\af12\loch\f2 Malware (}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid721325 \hich\af0\dbch\af12\loch\f0 Malicious Software is software designed to infiltrate or damage)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par }\pard \ltrpar\ql \li0\ri0\nowidctlpar\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15931312
\hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 Virus }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par }\pard \ltrpar\ql \li0\ri0\sb100\sa100\nowidctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 Spyware (}{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\insrsid721325
\hich\af0\dbch\af12\loch\f0 Spyware}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid721325 \hich\af0\dbch\af12\loch\f0 is }{\field{\*\fldinst {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid721325 \hich\af0\dbch\af12\loch\f0 HYPERLINK "/wiki/Computer_software"}{\rtlch\fcs1
\af0 \ltrch\fcs0 \insrsid14040245 {\*\datafield 00d0c9ea79f9bace118c8200aa004ba90b0200000001000000e0c9ea79f9bace118c8200aa004ba90b300000002f00770069006b0069002f0043006f006d00700075007400650072005f0073006f00660074007700610072006500000000000044000000}}
}{\fldrslt {\rtlch\fcs1 \af0 \ltrch\fcs0 \ul\cf2\insrsid721325 \hich\af0\dbch\af12\loch\f0 computer software}}}\sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid721325 \hich\af0\dbch\af12\loch\f0
that collects personal information about users without their }{\field{\*\fldinst {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid721325 \hich\af0\dbch\af12\loch\f0 HYPERLINK "/wiki/Informed_consent"}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid14040245 {\*\datafield
00d0c9ea79f9bace118c8200aa004ba90b0200000001000000e0c9ea79f9bace118c8200aa004ba90b2e0000002f00770069006b0069002f0049006e0066006f0072006d00650064005f0063006f006e00730065006e007400000000000000000000}}}{\fldrslt {\rtlch\fcs1 \af0 \ltrch\fcs0
\ul\cf2\insrsid721325 \hich\af0\dbch\af12\loch\f0 informed consent}}}\sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid721325 \hich\af0\dbch\af12\loch\f0 . )}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\par }\pard \ltrpar\ql \li0\ri0\nowidctlpar\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par
\par \hich\af2\dbch\af12\loch\f2 15. Which of the following is used to lure an atta\hich\af2\dbch\af12\loch\f2 cker away from resources or sensitive areas?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 IPS systems (Intrusion Prevention)
\par \hich\af2\dbch\af12\loch\f2 ACLs (Access Control List on Routers)
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid1011245 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 Honeypots }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 NAT (Network to Address Translation)
\par \hich\af2\dbch\af12\loch\f2
\par
\par \hich\af2\dbch\af12\loch\f2 16. When launching a full penetration test on an organization what \hich\af2\dbch\af12\loch\f2 is the first step in the process?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Using automated vulnerability scanners to catch obvious problems
\par \hich\af2\dbch\af12\loch\f2 Interact with staff members to find what systems could be vulnerable
\par \hich\af2\dbch\af12\loch\f2 Perform information gathering about the company, its functions, and who it m\hich\af2\dbch\af12\loch\f2 ight have dealings with
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid6759917 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 Get written consent from a executive off}{\rtlch\fcs1 \af2\afs20
\ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 icer for the penetration test }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 17. What region of memory is used to dynamically store and manipulate most program function variables?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 pagefile (swapping to the harddisk)
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4609530 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 stack }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 frame pointer (pointer to memory location)
\par \hich\af2\dbch\af12\loch\f2 heap (just program storage)
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 18. Which of the following is a delivery mechanism for a stack, heap, or static overflow to occur?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 logical memory allocation (real memory allocation)
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15626152 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 in\hich\af2\dbch\af12\loch\f2 teger overflows }{\rtlch\fcs1 \af2\afs20
\ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 tcp flood (doesn't overflow memory)
\par \hich\af2\dbch\af12\loch\f2 buffer allocation (allocation good)
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 19. What important part of the Windows operating system is an integral part of the Windows Security Model and is responsible for enforcing access control?
\par \hich\af2\dbch\af12\loch\f2
\par }\pard \ltrpar\ql \li0\ri0\sb100\sa100\nowidctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 kernel security module (}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid721325
\hich\af0\dbch\af12\loch\f0 framework of kernel hooks that would allow many security models to work as loadable kernel modules.)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\par }\pard \ltrpar\ql \li0\ri0\nowidctlpar\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4939730
\hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 security reference monitor }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par }\pard \ltrpar\ql \li0\ri0\sb100\sa100\nowidctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 memory allocation model (}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid721325
\hich\af0\dbch\af12\loch\f0 The part of the operating system which handles this responsibil\hich\af0\dbch\af12\loch\f0 ity is called the memory manager.)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\par }\pard \ltrpar\ql \li0\ri0\nowidctlpar\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2 security access kernel
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 20. What type of code mutates and changes itself while keeping the original program algorithm intact?
\par \hich\af2\dbch\af12\loch\f2
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid211123 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 Polymorphic }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2 (mutates and changes itself)
\par \hich\af2\dbch\af12\loch\f2 Metamorphic (rewrites itself)
\par \hich\af2\dbch\af12\loch\f2 Encrypted (doesn't keep the original program)
\par \hich\af2\dbch\af12\loch\f2 Tainted (if it's not good)
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 21. What is the process by which a user is granted privileges for access to resources that were not previously authorized?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 unauthorized entry (not a process)
\par \hich\af2\dbch\af12\loch\f2 account \hich\af2\dbch\af12\loch\f2 locking
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10364937 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 privilege escalation }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 information leakage
\par \hich\af2\dbch\af12\loch\f2
\par
\par \hich\af2\dbch\af12\loch\f2 22. Which of the following are acceptable sources for information gathering and enumeration?
\par \hich\af2\dbch\af12\loch\f2
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 newsgroups }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 dns querying }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\par \hich\af2\dbch\af12\loch\f2 search engines }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid6625200 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 all of the above }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 23. In unix operating systems, a penetration tester should be able to identify three valid file permissions including: read, write, and:
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 locked (not a file permission)
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9314418 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 execute }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 empty (not a file permission)
\par \hich\af2\dbch\af12\loch\f2 owner
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 24. Which of the following is a weakness of modern day Intrusion Detection Systems?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 signature based detection (is an IDS)
\par \hich\af2\dbch\af12\loch\f2 statistical profiling ( some do this)
\par \hich\af2\dbch\af12\loch\f2 processing of UDP traffic ( they do process UDP traffic)
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4468625 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 i}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237
\hich\af2\dbch\af12\loch\f2 nspecting encrypted tr\hich\af2\dbch\af12\loch\f2 affic }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 25. Using netcat and connecting to port 80 on a webserver to issue the command GET / HTTP/1.0 is an example of what?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 passive reconnaissance ( the question is not passive)
\par \hich\af2\dbch\af12\loch\f2 passive enumeration ( the question is not passive)
\par \hich\af2\dbch\af12\loch\f2 script analy\hich\af2\dbch\af12\loch\f2 sis ( what script??? there is no code here)
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12535208 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 banner grabbing }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 26. Which of the following protocols can traffic be tunneled through?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 SSH
\par \hich\af2\dbch\af12\loch\f2 ICMP
\par \hich\af2\dbch\af12\loch\f2 SSL
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid351655 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 All of the above }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 27. Which of the following is a technique with which a\hich\af2\dbch\af12\loch\f2 n attacker modifies a user-defined URL string that he/she knows will be processed by a backend SQL server?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 SQL command overflow
\par \hich\af2\dbch\af12\loch\f2 SQL record spoofing
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11673316 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 SQL injection }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 SQL formatting string
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 28. Which of the following best describes a type of attack that involves the mass distribution of spoofed email messages with return addresses, links, and brandings that appear to come from legitimate companies or personnel?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Phreaking ( phone )
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid1858696 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 P\hich\af2\dbch\af12\loch\f2 his}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 hing }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par }\pard \ltrpar\ql \li0\ri0\sb100\sa100\nowidctlpar\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 Social Engineering (}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid721325
\hich\af0\dbch\af12\loch\f0 a collection of techniques used to manipulate people )}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par }\pard \ltrpar\ql \li0\ri0\nowidctlpar\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin0\itap0 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2 Passive Enumeration ( the question is not passive)
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 29. The OSSTMM is best described as what?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 passive information gathering source
\par \hich\af2\dbch\af12\loch\f2 a hacking guide (doe\hich\af2\dbch\af12\loch\f2 sn't really give instruction's)
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid5248763 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 a methodology }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 a reporting structure after penetration testing
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 30. A shadow file is best described as what?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 a hidden file in the windows operating system that contains hashed passwords
\par \hich\af2\dbch\af12\loch\f2 a executable fil\hich\af2\dbch\af12\loch\f2 e in linux that can be used to exploit a system
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12144379 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 a type of password file }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 a hidden Novell Netware password file
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 31. The purpose of penetration testing can be defined as:
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Hacking to impress friends and others so they will acknowledge or hire you (not)
\par \hich\af2\dbch\af12\loch\f2 Identify, correct and mitigate vunerabilities and or risk posed to targeted systems (never correct)
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2563773 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 Identify and correct u\hich\af2\dbch\af12\loch\f2
nderlying systems failed management processes
\par \hich\af2\dbch\af12\loch\f2 Testing a network or host for valuable information in weaknesses
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 32. Preparation, Detection, Containment, Eradication, Recovery and Followup are steps referred to in which incident response methology?\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 FRECDP
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid5445750 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 PDCERF }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 PCDERF
\par \hich\af2\dbch\af12\loch\f2 FEDRESP
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 33. Which is the most important step in evidence collection for computer forensic analysis?
\par \hich\af2\dbch\af12\loch\f2
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid6692031 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 Chain of Custody
\par \hich\af2\dbch\af12\loch\f2 Image Acquistion
\par \hich\af2\dbch\af12\loch\f2 Image aquisition and}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 maintaining chain of custody }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 obt\hich\af2\dbch\af12\loch\f2 aining a warrant
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 34. Which of the following is the FOUNDATION for information security?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Employee training and education
\par \hich\af2\dbch\af12\loch\f2 Business ethics
\par \hich\af2\dbch\af12\loch\f2 Balanced Information Security Operations
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9918739 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 Security Policies }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 35. Shoulder Surfing is a technique for which type of the following attacks?
\par \hich\af2\dbch\af12\loch\f2
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 Covert Operations Attack }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15105287 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 Social Engineering
\par \hich\af2\dbch\af12\loch\f2 Fraudulent Interception Attack
\par \hich\af2\dbch\af12\loch\f2 People Engineering
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 36. Social Engineering is referred to as the art of
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Engagi\hich\af2\dbch\af12\loch\f2 ng in after hours parties with business partners
\par \hich\af2\dbch\af12\loch\f2 Applied interaction with skilled engineers
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid7548511 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 Tricking people into re}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 vealing sensitive information }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Coordination of engineering personnel
\par \hich\af2\dbch\af12\loch\f2
\par
\par
\par
\par \hich\af2\dbch\af12\loch\f2
\par
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 37. Which of the following can be implemente\hich\af2\dbch\af12\loch\f2 d to isolate an active network attack?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Spoofing countermeasures
\par \hich\af2\dbch\af12\loch\f2 Firewall Defense Attack Routines
\par \hich\af2\dbch\af12\loch\f2 Intrusion Detection Systems (IDS)
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8017173 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 Honeypots and Honeynets }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 38. Which of the following descri\hich\af2\dbch\af12\loch\f2 be Denial of Service Attack (DoS) testing benefit?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Baseline for normal use
\par \hich\af2\dbch\af12\loch\f2 Single Points of Failure
\par \hich\af2\dbch\af12\loch\f2 Identify DoS vunerable systems
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9046822 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 All the Above }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 39. Which of the following mechanisms is use to identify suspicious activities, intrusi\hich\af2\dbch\af12\loch\f2 on attempts and potiential security breaches?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Firewalls (Accept or deny)
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8857040 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 Intr}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237
\hich\af2\dbch\af12\loch\f2 usion Detection Systems (IDS) }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Access Control Lists (ACLs) (used for authentication)
\par \hich\af2\dbch\af12\loch\f2 Security Audit Logging (Identifies suspicious activity)
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 40. Which of the f\hich\af2\dbch\af12\loch\f2 ollowing is the most common attack?
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Heap Overflows (most difficult)
\par \hich\af2\dbch\af12\loch\f2 String Formatting Flaws (difficult)
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12588345 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2 Buffer Over}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237
\hich\af2\dbch\af12\loch\f2 flows }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325 \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Protocol Flaws (who wants to take over TCP or UDP)
\par \hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 41. A set of tools used after cracking a compute\hich\af2\dbch\af12\loch\f2 r system that hides processes, logins as well as ""sniffs"" keystrokes is known as _______?
\par \hich\af2\dbch\af12\loch\f2
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid409923 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 Rootkit }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid721325
\hich\af2\dbch\af12\loch\f2
\par \hich\af2\dbch\af12\loch\f2 Trojan
\par \hich\af2\dbch\af12\loch\f2 Malware
\par \hich\af2\dbch\af12\loch\f2 Spyware
\par \hich\af2\dbch\af12\loch\f2
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 42. You are a security analyst working for a private company out of {\*\xmlopen\xmlns2{\factoidname place}}{\*\xmlopen\xmlns2{\factoidname country-region}}
\hich\af2\dbch\af12\loch\f2 France{\*\xmlclose}{\*\xmlclose}. Your current \hich\af2\dbch\af12\loch\f2 assignment is to obtain credit card information from a Swiss bank owned by that company. After initial reconnaissance, you discover that the bank
\hich\f2 \rquote \loch\f2 s security defenses are too strong and would take too long to penetrate. You decide to get the information \hich\af2\dbch\af12\loch\f2 b\hich\af2\dbch\af12\loch\f2
y monitoring the traffic between the bank and one of its subsidiaries in {\*\xmlopen\xmlns2{\factoidname place}}{\*\xmlopen\xmlns2{\factoidname City}}\hich\af2\dbch\af12\loch\f2 London{\*\xmlclose}{\*\xmlclose}
. After monitoring some of the traffic, you notice a lot of FTP packets back and forth. You want to sniff the traffic and extract user names and passwords. What tool\hich\af2\dbch\af12\loch\f2 could you use to obtain this information?
\par
\par \hich\af2\dbch\af12\loch\f2 Airsnort
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid6059609 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 Ettercap
\par \hich\af2\dbch\af12\loch\f2 Snort
\par \hich\af2\dbch\af12\loch\f2 Raid Sniff
\par
\par \hich\af2\dbch\af12\loch\f2 43. Why is a static packet filter firewall not as secure as other types of firewalls?
\par
\par \hich\af2\dbch\af12\loch\f2 They cannot look into the packet at all
\par \hich\af2\dbch\af12\loch\f2 They cannot restrict IP packets based on thei\hich\af2\dbch\af12\loch\f2 r destination
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3426064 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 They do not look into the packet past header information
\par \hich\af2\dbch\af12\loch\f2 They cannot restrict IP packets based on source
\par
\par \hich\af2\dbch\af12\loch\f2 44. What will the following command produce on a website\hich\f2 \rquote \loch\f2 s login page:
\par \tab \hich\af2\dbch\af12\loch\f2 SELECT email, psswd, login_id, full_name
\par \tab \hich\af2\dbch\af12\loch\f2 FROM members
\par \tab \hich\af2\dbch\af12\loch\f2 WHERE email= }{\field{\*\fldinst {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 HYPERLINK "mailto:}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237\charrsid9380237
\hich\af2\dbch\af12\loch\f2 someone@somewhere.com}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 " }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid14040245\charrsid14056839 {\*\datafield
00d0c9ea79f9bace118c8200aa004ba90b02000000170000001600000073006f006d0065006f006e006500400073006f006d006500770068006500720065002e0063006f006d000000e0c9ea79f9bace118c8200aa004ba90b3a0000006d00610069006c0074006f003a0073006f006d0065006f006e006500400073006f00
6d006500770068006500720065002e0063006f006d00000000649300003e}}}{\fldrslt {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \cs15\f2\fs20\ul\cf2\insrsid9380237\charrsid14056839 \hich\af2\dbch\af12\loch\f2 someone@somewhere.com}}}\sectd \ltrsect
\linex0\sectdefaultcl\sftnbj {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \loch\af2\dbch\af12\hich\f2 \rquote \loch\f2 ; DROP TABLE members; --\hich\f2 \rquote
\par
\par \hich\af2\dbch\af12\loch\f2 Deletes the entire members table
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4350168 \hich\af2\dbch\af12\loch\f2 (\hich\af2\dbch\af12\loch\f2 X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2
This command will not produce anything since the syntax is incorrect
\par \hich\af2\dbch\af12\loch\f2 Insert the }{\field{\*\fldinst {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 HYPERLINK "mailto:someone@somewhere.com" }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid14040245\charrsid14056839 {\*\datafield
00d0c9ea79f9bace118c8200aa004ba90b02000000170000001600000073006f006d0065006f006e006500400073006f006d006500770068006500720065002e0063006f006d000000e0c9ea79f9bace118c8200aa004ba90b3a0000006d00610069006c0074006f003a0073006f006d0065006f006e006500400073006f00
6d006500770068006500720065002e0063006f006d0000000075a3000017}}}{\fldrslt {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \cs15\f2\fs20\ul\cf2\insrsid9380237\charrsid14056839 \hich\af2\dbch\af12\loch\f2 someone@somewhere.\hich\af2\dbch\af12\loch\f2 com}}}
\sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 email address into the members table
\par \hich\af2\dbch\af12\loch\f2 Retrieves the password for the first member in the members table
\par
\par \hich\af2\dbch\af12\loch\f2 45. After passing her CEH exam, Carol wants to ensure that her entire network is completely secure. She implements a DMZ statefull firewall,}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid5002355
\hich\af2\dbch\af12\loch\f2 NAT,\hich\af2\dbch\af12\loch\f2 IPSEC and packet filtering firewall. Since all of the security measures were taken, none of the hosts on her network can reach the internet. Why is that?
\par
\par \hich\af2\dbch\af12\loch\f2 Statefull firewalls do not work with packet filtering firewalls
\par \hich\af2\dbch\af12\loch\f2 IPSEC does not work with packet fi\hich\af2\dbch\af12\loch\f2 ltering firewalls
\par \hich\af2\dbch\af12\loch\f2 NAT does not work with statefull firewalls
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid13241902 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid5002355 \hich\af2\dbch\af12\loch\f2 NAT does not work with IPSEC
\par }\pard \ltrpar\ql \li0\ri0\nowidctlpar\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin0\itap0\pararsid5002355 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid5002355
\par \hich\af2\dbch\af12\loch\f2 46. To test your website for vulnerabilities, you type a quotation mark (\hich\f2 \lquote \loch\f2 ) into the username field.}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9380237 \hich\af2\dbch\af12\loch\f2 }{
\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid5002355 \hich\af2\dbch\af12\loch\f2 After you click OK, you receive t\hich\af2\dbch\af12\loch\f2 he following error message window:
\par \tab \hich\af2\dbch\af12\loch\f2 Microsoft OLE DB Provider for ODCB drivers
\par \tab \hich\af2\dbch\af12\loch\f2 Error \hich\f2 \lquote \loch\f2 80040e14\hich\f2 \rquote \loch\f2 [Microsoft] [ODCB Microsoft Access Driver] extra
\par \tab \hich\af2\dbch\af12\loch\f2 (in query expression userid\hich\f2 \rquote \loch\f2 =\hich\f2 \rquote \loch\f2 3306\hich\f2 \rquote \loch\f2 ) or (\hich\f2 \lquote \loch\f2 a\hich\f2 \rquote \loch\f2 =\hich\f2 \rquote \loch\f2 a\hich\f2 \rquote
\loch\f2 \hich\f2 AND Password=\'94\'94\loch\f2 .)
\par \tab \hich\af2\dbch\af12\loch\f2 /_users/loginmain.asp, line 41
\par
\par \hich\af2\dbch\af12\loch\f2 What can you infer from the error window?
\par \hich\af2\dbch\af12\loch\f2 (\hich\f2 \lquote \loch\f2 ) is a valid username?
\par \hich\af2\dbch\af12\loch\f2 SQL injection is not possible
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid7632373 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid5002355 \hich\af2\dbch\af12\loch\f2 SQL injection is possible
\par \hich\af2\dbch\af12\loch\f2 The user for line 3306 in the SQL database has a weak password
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid14178935
\par \hich\af2\dbch\af12\loch\f2 47. You are running through a series of tests on your network to t\hich\af2\dbch\af12\loch\f2
est for vulnerabilities. After normal working hours, you initiate a DoS attack on your external firewall. The firewall quickly freezes up and becomes unusable. You then initiate FTP connection from an external IP into your internal network. The connec
\hich\af2\dbch\af12\loch\f2 t\hich\af2\dbch\af12\loch\f2 ion is successful even though you have blocked FTP at the external firewall. What happened?
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid7632373 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid14178935 \hich\af2\dbch\af12\loch\f2 The firewall failed-open
\par \hich\af2\dbch\af12\loch\f2 The firewall\hich\f2 \rquote \loch\f2 s ACL has been purged
\par \hich\af2\dbch\af12\loch\f2 The firewall fail-closed
\par \hich\af2\dbch\af12\loch\f2 The firewall failed-bypass
\par
\par \hich\af2\dbch\af12\loch\f2 48. You set up SNMP in multiple offices of you\hich\af2\dbch\af12\loch\f2
r company. Your SNMP manager is not receiving data from other offices like he is the main. You suspect the firewall changes are to blame. What port should you open up for SNMP to work through firewalls?
\par
\par \hich\af2\dbch\af12\loch\f2 170
\par \hich\af2\dbch\af12\loch\f2 162
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3883114 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid14178935 \hich\af2\dbch\af12\loch\f2 161
\par \hich\af2\dbch\af12\loch\f2 173
\par }\pard \ltrpar\ql \li0\ri0\nowidctlpar\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin0\itap0\pararsid14178935 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid14178935
\par \hich\af2\dbch\af12\loch\f2 49.}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid14178935 \hich\af2\dbch\af12\loch\f2 Software firewalls wor
\hich\af2\dbch\af12\loch\f2 k at which level of the OSI model?
\par }\pard \ltrpar\ql \li360\ri0\nowidctlpar\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin360\itap0\pararsid14178935 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid14178935
\par }\pard \ltrpar\ql \li0\ri0\nowidctlpar\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin0\itap0\pararsid14178935 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid14178935 \hich\af2\dbch\af12\loch\f2 Network
\par \hich\af2\dbch\af12\loch\f2 Transport
\par \hich\af2\dbch\af12\loch\f2 Data Link
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3883114 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid14178935 \hich\af2\dbch\af12\loch\f2 Application
\par }\pard \ltrpar\ql \li360\ri0\nowidctlpar\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin360\itap0\pararsid14178935 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid4938721
\par }\pard \ltrpar\ql \li0\ri0\nowidctlpar\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin0\itap0\pararsid4938721 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid4938721 \hich\af2\dbch\af12\loch\f2 50.}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid14178935 \hich\af2\dbch\af12\loch\f2
When setting up a wireless network with multiple access points, why is it important for each access point be on a different channel?
\par }\pard \ltrpar\ql \li360\ri0\nowidctlpar\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin360\itap0\pararsid14178935 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid14178935
\par }\pard \ltrpar\ql \li0\ri0\nowidctlpar\tqc\tx0\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin0\itap0\pararsid4938721 {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid4938721 \hich\af2\dbch\af12\loch\f2 So that the access points will work on different frequencies
\par \hich\af2\dbch\af12\loch\f2 Multiple access points can be set up on the same channel without isues
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3883114 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4938721 \hich\af2\dbch\af12\loch\f2 Avoid cross talk
\par \hich\af2\dbch\af12\loch\f2 Avoid over saturation of wireless signals
\par
\par \hich\af2\dbch\af12\loch\f2 51.}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4938721 \hich\af2\dbch\af12\loch\f2 You are carrying out the last roun
\hich\af2\dbch\af12\loch\f2
d of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code
\hich\af2\dbch\af12\loch\f2 i\hich\af2\dbch\af12\loch\f2 nto a search field on web pages to check for vulnerabilities:
\par \tab \hich\af2\dbch\af12\loch\f2 \hich\f2
\par
\par \hich\af2\dbch\af12\loch\f2 What is the result of this test?
\par \hich\af2\dbch\af12\loch\f2 Your website if vulnerable to CSS
\par \hich\af2\dbch\af12\loch\f2 Your website is not vulnerable
\par \hich\af2\dbch\af12\loch\f2 Your website is vulnerable to SQL injection
\par \hich\af2\dbch\af12\loch\f2 Your web\hich\af2\dbch\af12\loch\f2 sire is vulnerable to web bugs
\par
\par \hich\af2\dbch\af12\loch\f2 52.You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come acro
\hich\af2\dbch\af12\loch\f2 ss a web security sity that recommends inputting the following code into a search field on web pages to check for vulnerabilities:
\par \tab \hich\af2\dbch\af12\loch\f2
\par
\par \hich\af2\dbch\af12\loch\f2 When you type this and click on search, you receive a pop-up window that says:
\par \loch\af2\dbch\af12\hich\f2 \'93\loch\f2 Thi\hich\af2\dbch\af12\loch\f2 \hich\f2 s is a test\'94
\par \hich\af2\dbch\af12\loch\f2 What is the result of this test?
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3883114 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4938721 \hich\af2\dbch\af12\loch\f2 Your website is vulnerable to CSS
\par \hich\af2\dbch\af12\loch\f2 Your website is not vulnerable
\par \hich\af2\dbch\af12\loch\f2 Your website is vulnerable to SQL Injection
\par \hich\af2\dbch\af12\loch\f2 Your website is vulnerable to web bugs
\par
\par \hich\af2\dbch\af12\loch\f2 53.}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4938721 \hich\af2\dbch\af12\loch\f2
Larry is an IT consultant who works for corporat\hich\af2\dbch\af12\loch\f2 ions and government agencies. Larry plans on shuttling down the city\hich\f2 \rquote \loch\f2 \hich\f2 s network using BGP devices and \'93\loch\f2 \hich\f2 zombies\'94\loch\f2
. What type of Penetration Testing is Larry planning to carry out?
\par
\par \hich\af2\dbch\af12\loch\f2 Internal Penetration Testing
\par \hich\af2\dbch\af12\loch\f2 Router Penetration Testing
\par \hich\af2\dbch\af12\loch\f2 Firewall Penetration\hich\af2\dbch\af12\loch\f2 Testing
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid6032389 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4938721 \hich\af2\dbch\af12\loch\f2 DoS Penetration Testing
\par
\par \hich\af2\dbch\af12\loch\f2 54.}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4938721 \hich\af2\dbch\af12\loch\f2
When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?
\par
\par \hich\af2\dbch\af12\loch\f2 NIPS
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid6032389 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4938721 \hich\af2\dbch\af12\loch\f2 Active IDS
\par \hich\af2\dbch\af12\loch\f2 Progressive IDS
\par \hich\af2\dbch\af12\loch\f2 Passive IDS
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3416958
\par
\par \hich\af2\dbch\af12\loch\f2 55.}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3416958 \hich\af2\dbch\af12\loch\f2 You are the network administrator fo
\hich\af2\dbch\af12\loch\f2 r a small bank in {\*\xmlopen\xmlns2{\factoidname City}}{\*\xmlopen\xmlns2{\factoidname place}}{\*\xmlopen\xmlns2{\factoidname City}}\hich\af2\dbch\af12\loch\f2 Dallas{\*\xmlclose}, {\*\xmlopen\xmlns2{\factoidname State}}
\hich\af2\dbch\af12\loch\f2 Texas{\*\xmlclose}{\*\xmlclose}{\*\xmlclose}
. To ensure security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy fo force 14 character passwords\hich\af2\dbch\af12\loch\f2
. A week later you dump the SAM database from the stand alone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour.
\par \hich\af2\dbch\af12\loch\f2 Why are these passwords cracked so easily?
\par
\par \hich\af2\dbch\af12\loch\f2 The passwords that were cracked are local a\hich\af2\dbch\af12\loch\f2 ccounts on the Domain Controller
\par \hich\af2\dbch\af12\loch\f2 Networks using Active Directory never use SAM databases so the SAM database pulled was empty
\par \hich\af2\dbch\af12\loch\f2 A password Group Policy change takes at least 3 weeks to completely replicate throughout a network
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2575608 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3416958 \hich\af2\dbch\af12\loch\f2 Passwords of 14 characters o\hich\af2\dbch\af12\loch\f2
r less are broken up into two 7 character hashes
\par
\par \hich\af2\dbch\af12\loch\f2 56.}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3416958 \hich\af2\dbch\af12\loch\f2
Michael works for Kimball Construction Company as a senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using, Nmap, Michael conduct XMAS scan and\hich\af2\dbch\af12\loch\f2
most of the ports scanned do not give a response. In what state are these ports?
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2311873 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3416958 \hich\af2\dbch\af12\loch\f2 Open
\par \hich\af2\dbch\af12\loch\f2 Stealth
\par \hich\af2\dbch\af12\loch\f2 Closed
\par \hich\af2\dbch\af12\loch\f2 Filtered
\par
\par \hich\af2\dbch\af12\loch\f2 57. George is a senior security analyst working for a state agency in {\*\xmlopen\xmlns2{\factoidname place}}{\*\xmlopen\xmlns2{\factoidname State}}\hich\af2\dbch\af12\loch\f2 Florida{\*\xmlclose}{\*\xmlclose}. His state
\hich\f2 \rquote \loch\f2 s congress ju\hich\af2\dbch\af12\loch\f2 \hich\f2
st passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a \'93
\loch\f2 tim\hich\af2\dbch\af12\loch\f2 e\hich\af2\dbch\af12\loch\f2 \hich\f2 -based induction machine\'94\loch\f2 be used.
\par
\par \hich\af2\dbch\af12\loch\f2 What IDS feature must George implement to meet the requirement
\par
\par \hich\af2\dbch\af12\loch\f2 Signature based anomaly detection
\par \hich\af2\dbch\af12\loch\f2 Pattern matching
\par \hich\af2\dbch\af12\loch\f2 Real-time Anomaly
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid6165262 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3416958 \hich\af2\dbch\af12\loch\f2 Statistical-based anomaly detection
\par
\par \hich\af2\dbch\af12\loch\f2 58. Jonathan is a network administrator who is \hich\af2\dbch\af12\loch\f2
currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan?
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4534742 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3416958 \hich\af2\dbch\af12\loch\f2 HTTP protocol does not maintain session
\par \hich\af2\dbch\af12\loch\f2 Only DNS traffic can be hijacked
\par \hich\af2\dbch\af12\loch\f2 Only FTP \hich\af2\dbch\af12\loch\f2 traffic can be hijacked
\par \hich\af2\dbch\af12\loch\f2 Only HTTPS session can be hijacked
\par
\par \hich\af2\dbch\af12\loch\f2 59. Jason has set up a honeypot environment by creating a DMZ that has no physi}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3875234 \hich\af2\dbch\af12\loch\f2
cal or logical access to his production network. In this honeypot, he has placed a server running Windows Active Dire\hich\af2\dbch\af12\loch\f2
ctory. He has placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honey pot
\hich\af2\dbch\af12\loch\f2 \hich\af2\dbch\af12\loch\f2 and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information.}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid3416958
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3875234 \hich\af2\dbch\af12\loch\f2 Why is this not viable?
\par
\par \hich\af2\dbch\af12\loch\f2 Entrapment
\par \hich\af2\dbch\af12\loch\f2 Intruding into a honeypot is not illegal
\par \hich\af2\dbch\af12\loch\f2 Intruding into a DMZ is not illegal
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8737575 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3875234 \hich\af2\dbch\af12\loch\f2 Enticement
\par
\par \hich\af2\dbch\af12\loch\f2 60. Paul\hich\f2 \rquote \loch\f2
s company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed: it is now time for the physical round to begin. None of the employees are ma
\hich\af2\dbch\af12\loch\f2
de aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering
\hich\af2\dbch\af12\loch\f2 \hich\af2\dbch\af12\loch\f2 the main office he is able to get into the server telling the IT manager that there is a problem with the outlets in that room.
\par \hich\af2\dbch\af12\loch\f2 What type of attack has the technician performed?
\par
\par \hich\af2\dbch\af12\loch\f2 Backtrapping
\par \hich\af2\dbch\af12\loch\f2 Fuzzing
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3033347 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3875234 \hich\af2\dbch\af12\loch\f2 Tailgating
\par \hich\af2\dbch\af12\loch\f2 Man trap attack
\par
\par
\par \hich\af2\dbch\af12\loch\f2 61. Harold is a web desi\hich\af2\dbch\af12\loch\f2
gner who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far. Harold navigates to google.com and enters t
\hich\af2\dbch\af12\loch\f2 h\hich\af2\dbch\af12\loch\f2 e following search.
\par \tab \hich\af2\dbch\af12\loch\f2 link:www.ghttech.net
\par \hich\af2\dbch\af12\loch\f2 What will this search produce?
\par
\par \hich\af2\dbch\af12\loch\f2 All search engines that link to .net domains
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid6846992 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3875234 \hich\af2\dbch\af12\loch\f2 All sites that link to ghttech.net
\par \hich\af2\dbch\af12\loch\f2 Sites that contain the code: link:www.ghttech.net
\par \hich\af2\dbch\af12\loch\f2 All sites that ghttech.net links to
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12522614 \hich\af2\dbch\af12\loch\f2 62. John and\hich\af2\dbch\af12\loch\f2 Hillary work at the same department company. John wants to find out Hillary\hich\f2 \rquote \loch\f2
s network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to }{\field{\*\fldinst {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12522614
\hich\af2\dbch\af12\loch\f2 HYPERL\hich\af2\dbch\af12\loch\f2 INK "\\\\\\\\FilerServer1\\\\sales.sls" }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid14040245\charrsid14056839 {\*\datafield
00d0c9ea79f9bace118c8200aa004ba90b0200000017010000190000005c005c00460069006c006500720053006500720076006500720031005c00730061006c00650073002e0073006c0073000000190000005c005c00460069006c006500720053006500720076006500720031005c00730061006c00650073002e007300
6c007300000000009a000000}}}{\fldrslt {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \cs15\f2\fs20\ul\cf2\insrsid12522614\charrsid14056839 \\\\\hich\af2\dbch\af12\loch\f2 FilerServer1\\sales.sls}}}\sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\rtlch\fcs1 \af2\afs20
\ltrch\fcs0 \f2\fs20\insrsid3875234
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12522614 \hich\af2\dbch\af12\loch\f2 What information will he be able to gather from this?
\par
\par \hich\af2\dbch\af12\loch\f2 The SAM file from Hillary\hich\f2 \rquote \hich\af2\dbch\af12\loch\f2 s computer
\par \hich\af2\dbch\af12\loch\f2 The SID of Hillary\hich\f2 \rquote \loch\f2 s network account
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid6846992 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12522614 \hich\af2\dbch\af12\loch\f2 Hillary\hich\f2 \rquote \loch\f2 s network username and password hash
\par \hich\af2\dbch\af12\loch\f2 The network shares that Hillary has permission
\par
\par
\par \hich\af2\dbch\af12\loch\f2 63. Where would you find a list of well known ports on your Windows 2003 Server?
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3875234
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid6846992 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12522614 \hich\af2\dbch\af12\loch\f2 %systemroot%\\system32\\driv\hich\af2\dbch\af12\loch\f2 ers\\etc\\
services
\par \hich\af2\dbch\af12\loch\f2 %systemroot%\\system32\\WBEM\\services
\par \hich\af2\dbch\af12\loch\f2 %systemroot%\\system32\\services
\par \hich\af2\dbch\af12\loch\f2 %systemroot%\\driver\\etc\\services
\par
\par
\par \hich\af2\dbch\af12\loch\f2 64. After undergoing a security audit, it was suggested that a hardened computer be placed in the DMZ to run firewall software. What is \hich\af2\dbch\af12\loch\f2 this hardened computer called?
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12060966 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12522614 \hich\af2\dbch\af12\loch\f2 Bastion firewall
\par \hich\af2\dbch\af12\loch\f2 Perimeter host
\par \hich\af2\dbch\af12\loch\f2 Perimeter firewall
\par \hich\af2\dbch\af12\loch\f2 Bastion host
\par
\par
\par \hich\af2\dbch\af12\loch\f2 65. Harold is the senior security analyst for a law firm on the East coast. He wants to test the security of his company\hich\f2 \rquote \hich\af2\dbch\af12\loch\f2
s web pages so he decides to use Form Scalpel from an outside connection through a proxy server over HTTPS. What will be the results from Harold\hich\f2 \rquote \loch\f2 s test?
\par
\par \hich\af2\dbch\af12\loch\f2 Form Scalpel will extract all javascript and perl code
\par \hich\af2\dbch\af12\loch\f2 Form Scalpel will not work over an HTTPS connection
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2695924 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12522614 \hich\af2\dbch\af12\loch\f2 He will be able to extract all the forms from the pages
\par \hich\af2\dbch\af12\loch\f2 Form Scalpel will not work through a proxy server connection
\par
\par
\par \hich\af2\dbch\af12\loch\f2 66. Why is it essential that security analysts know Cisco routers inside and out?
\par
\par \hich\af2\dbch\af12\loch\f2 99% of {\*\xmlopen\xmlns2{\factoidname place}}{\*\xmlopen\xmlns2{\factoidname City}}\hich\af2\dbch\af12\loch\f2 Enterprise{\*\xmlclose}{\*\xmlclose} routers are Cisco
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11278482 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12522614 \hich\af2\dbch\af12\loch\f2 75% of {\*\xmlopen\xmlns2{\factoidname place}}
{\*\xmlopen\xmlns2{\factoidname City}}\hich\af2\dbch\af12\loch\f2 Enterprise{\*\xmlclose}{\*\xmlclose} routers are Cisco
\par \hich\af2\dbch\af12\loch\f2 90% of Internet core routers are Cisco
\par \hich\af2\dbch\af12\loch\f2 25% of Internet core routers are Cisco
\par
\par
\par \hich\af2\dbch\af12\loch\f2 67. You are a security analyst performing a reconnaissance on a company you will b\hich\af2\dbch\af12\loch\f2
e carrying out a penetration test for. You conduct a search for IT jobs on Dice.com and find the following information for an open position
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15877312 \tab }{\rtlch\fcs1 \ab\af2\afs20 \ltrch\fcs0 \b\f2\fs20\insrsid15877312\charrsid15877312 \hich\af2\dbch\af12\loch\f2 7+ years experience in Windows server environment
\par \tab \hich\af2\dbch\af12\loch\f2 5+ years experience in Exchange 2000/2003 environment
\par }\pard \ltrpar\ql \li720\ri0\nowidctlpar\tqc\tx0\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin720\itap0\pararsid15877312 {\rtlch\fcs1 \ab\af2\afs20
\ltrch\fcs0 \b\f2\fs20\insrsid15877312\charrsid15877312 \tab \hich\af2\dbch\af12\loch\f2 Experie\hich\af2\dbch\af12\loch\f2 nce with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are required
\par }\pard \ltrpar\ql \li0\ri0\nowidctlpar\tqc\tx0\tx916\tx1832\tx2748\tx3664\tx4580\tx5496\tx6412\tx7328\tx8244\tx9160\tx10076\tx10992\tx11908\tx12824\tx13740\tx14656\wrapdefault\faauto\rin0\lin0\itap0\pararsid4938721 {\rtlch\fcs1 \ab\af2\afs20 \ltrch\fcs0
\b\f2\fs20\insrsid15877312\charrsid15877312 \tab \hich\af2\dbch\af12\loch\f2 MCSA desire, MCSE, CEH preferred
\par \tab \hich\af2\dbch\af12\loch\f2 No Unix/Linux Experience needed
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15877312
\par \hich\af2\dbch\af12\loch\f2 What is this information posted on the job website considered?
\par
\par \hich\af2\dbch\af12\loch\f2 Social engineering exploit
\par \hich\af2\dbch\af12\loch\f2 Competitive exploit
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid5325879 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15877312 \hich\af2\dbch\af12\loch\f2 Information vulnerability
\par \hich\af2\dbch\af12\loch\f2 Trade Secret
\par
\par
\par \hich\af2\dbch\af12\loch\f2 68. What is the target host IP in the following command?
\par }{\rtlch\fcs1 \ab\af2\afs20 \ltrch\fcs0 \b\f2\fs20\insrsid15877312\charrsid15877312 \hich\af2\dbch\af12\loch\f2 #>Firewalk \hich\f2 \endash }{\rtlch\fcs1 \ab\af2\afs20 \ltrch\fcs0 \b\f2\fs20\insrsid6247127 \hich\af2\dbch\af12\loch\f2 F 80 10}{\rtlch\fcs1
\ab\af2\afs20 \ltrch\fcs0 \b\f2\fs20\insrsid15877312\charrsid15877312 \hich\af2\dbch\af12\loch\f2 .10.150.1 172.16.28.95 \hich\f2 \endash \loch\f2 p UDP}{\rtlch\fcs1 \ab\af2\afs20 \ltrch\fcs0 \b\f2\fs20\insrsid15877312
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15877312 \hich\af2\dbch\af12\loch\f2 Firewalk does not scan target hosts
\par \hich\af2\dbch\af12\loch\f2 This command is using \hich\af2\dbch\af12\loch\f2 FIN packets, which cannot scan target hosts
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4742800 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15877312 \hich\af2\dbch\af12\loch\f2 10.10.150.1
\par \hich\af2\dbch\af12\loch\f2 172.16.28.95
\par
\par \hich\af2\dbch\af12\loch\f2 69.}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15877312 \hich\af2\dbch\af12\loch\f2
You are a security analyst performing a penetration tests for a company in the {\*\xmlopen\xmlns2{\factoidname place}}{\*\xmlopen\xmlns2{\factoidname State}}\hich\af2\dbch\af12\loch\f2 Midwest{\*\xmlclose}{\*\xmlclose}
. After some initial reconnaissance, you discover the IP addresses of some Cisco ro\hich\af2\dbch\af12\loch\f2 uters used by the company. You type in the following URL that includes the IP address of one of the routers:
\par }{\field{\*\fldinst {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15877312 \hich\af2\dbch\af12\loch\f2 HYPERLINK "http://172.168.4.131/level/99/exec/show/config" }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid14040245\charrsid14056839
{\*\datafield
00d0c9ea79f9bace118c8200aa004ba90b02000000170000002f00000068007400740070003a002f002f003100370032002e003100360038002e0034002e003100330031002f006c006500760065006c002f00390039002f0065007800650063002f00730068006f0077002f0063006f006e006600690067000000e0c9ea79
f9bace118c8200aa004ba90b5e00000068007400740070003a002f002f003100370032002e003100360038002e0034002e003100330031002f006c006500760065006c002f00390039002f0065007800650063002f00730068006f0077002f0063006f006e006600690067000000000000000000}}}{\fldrslt {
\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \cs15\f2\fs20\ul\cf2\insrsid15877312\charrsid14056839 \hich\af2\dbch\af12\loch\f2 http://172.168.4.131/level/99/exec/show/config}}}\sectd \ltrsect\linex0\sectdefaultcl\sftnbj {\rtlch\fcs1 \af2\afs20 \ltrch\fcs0
\f2\fs20\insrsid15877312
\par
\par \hich\af2\dbch\af12\loch\f2 After typing in this URL you are presented with configuration file for that router. What have you discovered?
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4800219 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15877312 \hich\af2\dbch\af12\loch\f2 HTTP Configuration Arbitrary Administrative Access Vulnerability
\par \hich\af2\dbch\af12\loch\f2 Cisco IOS Arbitrary Administrative Access Online Vulnerability
\par \hich\af2\dbch\af12\loch\f2 URL Obfuscation Arbitrary Administrative Access Vulnerability
\par \hich\af2\dbch\af12\loch\f2 HTML Configuration Arbitrary Administrative Access Vulnerability
\par
\par \hich\af2\dbch\af12\loch\f2 70. James is testing the ability of is routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?
\par
\par \hich\af2\dbch\af12\loch\f2 SYN Flood
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid662160 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15877312 \hich\af2\dbch\af12\loch\f2 Smurf
\par \hich\af2\dbch\af12\loch\f2 Fraggle
\par \hich\af2\dbch\af12\loch\f2 Trinoo
\par
\par
\par \hich\af2\dbch\af12\loch\f2 71. Julia \hich\af2\dbch\af12\loch\f2 is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in {\*\xmlopen\xmlns2{\factoidname State}}
\hich\af2\dbch\af12\loch\f2 Florida{\*\xmlclose}. They have given her permission to perform social engineering attacks on the company to see if their in-hous\hich\af2\dbch\af12\loch\f2
e training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company\hich\f2 \rquote \loch\f2 s main office in {\*\xmlopen\xmlns2{\factoidname State}}
\hich\af2\dbch\af12\loch\f2 Iowa{\*\xmlclose}. She states that she needs the receptionist\hich\f2 \rquote \loch\f2 s network us\hich\af2\dbch\af12\loch\f2
ername and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for}{
\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11540671 .}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid15877312
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11540671 \hich\af2\dbch\af12\loch\f2 What princi\hich\af2\dbch\af12\loch\f2 pal of social engineering did Julia use?
\par
\par \hich\af2\dbch\af12\loch\f2 Friendship/Liking
\par \hich\af2\dbch\af12\loch\f2 Reciprocation
\par \hich\af2\dbch\af12\loch\f2 Scarcity
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2178995 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11540671 \hich\af2\dbch\af12\loch\f2 Social Validation
\par
\par
\par \hich\af2\dbch\af12\loch\f2 72. As a security analyst you setup a false survey website that will require users to create a username and strong password. You send the link to all\hich\af2\dbch\af12\loch\f2
the employees of the company. What information will you be able to gather?
\par
\par \hich\af2\dbch\af12\loch\f2 The MAC address of the employees\hich\f2 \rquote \loch\f2 computers
\par \hich\af2\dbch\af12\loch\f2 Bank account numbers and the corresponding routing numbers
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2178995 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11540671 \hich\af2\dbch\af12\loch\f2 The employees network usernames and passwords
\par \hich\af2\dbch\af12\loch\f2 The IP address of the empl\hich\af2\dbch\af12\loch\f2 oyees\hich\f2 \rquote \loch\f2 computers
\par
\par
\par \hich\af2\dbch\af12\loch\f2
73. George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few Manager}{
\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 s}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11540671 \hich\af2\dbch\af12\loch\f2 are \hich\af2\dbch\af12\loch\f2
using SFTP programs on their computers. Before talking to his boss, George wants to have some proof of their activity.
\par \hich\af2\dbch\af12\loch\f2 George want}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 s}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11540671 \hich\af2\dbch\af12\loch\f2
to use Ethercal to monitor network traffic, but only SFTP traffic to and from his network. What filter should George use i\hich\af2\dbch\af12\loch\f2 n Ethercal
\par
\par \hich\af2\dbch\af12\loch\f2 Udp port 22 and host 172.16.281/24
\par \hich\af2\dbch\af12\loch\f2 Net port 22
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid6252008 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11540671 \hich\af2\dbch\af12\loch\f2 Src port 22 and dst port 22
\par \hich\af2\dbch\af12\loch\f2 Src port 23 and dst port 23
\par
\par
\par \hich\af2\dbch\af12\loch\f2 74. As part of the reconnaissance you are performing on a network, you use dnstracer to find valuable information. You type in the foll\hich\af2\dbch\af12\loch\f2 owing command:
\par }{\rtlch\fcs1 \ab\af2\afs20 \ltrch\fcs0 \b\f2\fs20\insrsid11540671\charrsid11540671 \hich\af2\dbch\af12\loch\f2 C:\\\hich\f2 >dnstracer \'93\loch\f2 \hich\f2 -q\'94\loch\f2 ptr 164.58.245.134.in-addr.arpa}{\rtlch\fcs1 \ab\af2\afs20 \ltrch\fcs0
\b\f2\fs20\insrsid11540671
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11540671 \hich\af2\dbch\af12\loch\f2 What information will this return?
\par
\par \hich\af2\dbch\af12\loch\f2 The in-addr.arpa record(s) for 164.58.245.134
\par \hich\af2\dbch\af12\loch\f2 The}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 host }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11540671 \hich\af2\dbch\af12\loch\f2 file record for 164.58.245.134
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2316032 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11540671 \hich\af2\dbch\af12\loch\f2 The PTR record(s) for 164.58.245.134
\par \hich\af2\dbch\af12\loch\f2 The A record(s) for 164.58.2\hich\af2\dbch\af12\loch\f2 45.134
\par
\par
\par \hich\af2\dbch\af12\loch\f2 75. You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of {\*\xmlopen\xmlns2{\factoidname State}}\hich\af2\dbch\af12\loch\f2 California
{\*\xmlclose}. Your next step is to initiate a DoS attack on their network. Why would you want to \hich\af2\dbch\af12\loch\f2 initiate a DoS attack on a system you are testing?
\par
\par \hich\af2\dbch\af12\loch\f2 Demonstrate that no system can be protected against DoS attacks
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4543516 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11540671 \hich\af2\dbch\af12\loch\f2 Use attack as a launching point to penetrate deeper into the network
\par \hich\af2\dbch\af12\loch\f2 List weak points on their network
\par \hich\af2\dbch\af12\loch\f2 Show outdated equipment so it can be replaced
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2373383 \hich\af2\dbch\af12\loch\f2 76. The objective of this act to protect consumers\hich\f2 \rquote \loch\f2 personal financial information held by financial institutions and their service providers
}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11540671
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2373383
\par \hich\af2\dbch\af12\loch\f2 Sarbanes-Oxley 2002
\par {\*\xmlopen\xmlns2{\factoidname State}}\hich\af2\dbch\af12\loch\f2 California{\*\xmlclose} SB 1386
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2240904 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2373383 \hich\af2\dbch\af12\loch\f2 Gramm-Leach-Bl\hich\af2\dbch\af12\loch\f2 iley Act
\par \hich\af2\dbch\af12\loch\f2 HIPAA
\par
\par
\par \hich\af2\dbch\af12\loch\f2 77. Paulette works for an IT security consulting company that is currently performing an audit for the firm ACE Unlimited. Paulette\hich\f2 \rquote \loch\f2 s duties include logging on to all the company\hich\f2 \rquote
\loch\f2 s network equipment to ensure IOS versions are up-to-date a\hich\af2\dbch\af12\loch\f2
nd all the other security setting are as stringent as possible. Paulette presents the following screenshot to her boss so he can inform the client about the necessary changed needed to be made. From the screenshot, what changes should the client company
\hich\af2\dbch\af12\loch\f2 \hich\af2\dbch\af12\loch\f2 make?
\par
\par \hich\af2\dbch\af12\loch\f2 The banner should include the Cisco tech support contact information as well
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10755747 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2373383 \hich\af2\dbch\af12\loch\f2 Remove any identifying numbers, names, or version information
\par \hich\af2\dbch\af12\loch\f2 \hich\f2 The banner should not state that \'93\loch\f2 \hich\f2 only authorized personnel may proceed\'94
\par
\par \hich\af2\dbch\af12\loch\f2 78. Why is it important to mentio\hich\af2\dbch\af12\loch\f2 n ROI when presenting executive report finding of a security analysis?
\par
\par \hich\af2\dbch\af12\loch\f2 There is no need to mention ROI in an executive report since that should be reserved for a financial report
\par \hich\af2\dbch\af12\loch\f2 ROI has nothing to do with a thorough security analysis report
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid16070304 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2373383 \hich\af2\dbch\af12\loch\f2 Executives\hich\af2\dbch\af12\loch\f2
will not spend money unless there is a return on investment
\par \hich\af2\dbch\af12\loch\f2 There is no need to mention ROI in an executive report since that should be reserved for a technical report
\par
\par
\par \hich\af2\dbch\af12\loch\f2 79. You are assisting a Departme\hich\af2\dbch\af12\loch\f2
nt of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. W}{\rtlch\fcs1
\af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322 \hich\af2\dbch\af12\loch\f2 hat type of firewall must\hich\af2\dbch\af12\loch\f2 you implement to}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2373383 \hich\af2\dbch\af12\loch\f2
abide by this policy?
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322
\par \hich\af2\dbch\af12\loch\f2 Packet filtering firewall
\par \hich\af2\dbch\af12\loch\f2 Application-level proxy firewall
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid7423200 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322 \hich\af2\dbch\af12\loch\f2 Statefull firewall
\par \hich\af2\dbch\af12\loch\f2 Circuit-level proxy firewall
\par
\par
\par \hich\af2\dbch\af12\loch\f2 80. You are working on a thesis for a doctorate degree in Computer Science. Your thesis is based on HT\hich\af2\dbch\af12\loch\f2
ML, DHTML, and other web-based languages and how they have evolved over the years. You navigate to archive.org and view the HTML code of news.com. You then navigate to the current news.com website and copy over the source code. While searching through
\hich\af2\dbch\af12\loch\f2 t\hich\af2\dbch\af12\loch\f2 he code, you come across something abnormal:
\par }{\rtlch\fcs1 \ab\af2\afs20 \ltrch\fcs0 \b\f2\fs20\insrsid8023322\charrsid8023322 \hich\af2\dbch\af12\loch\f2 }{\rtlch\fcs1 \ab\af2\afs20 \ltrch\fcs0 \b\f2\fs20\insrsid8023322
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322 \hich\af2\dbch\af12\loch\f2 What have you found?
\par
\par \hich\af2\dbch\af12\loch\f2 CGI code
\par \hich\af2\dbch\af12\loch\f2 Trojan.downloader
\par \hich\af2\dbch\af12\loch\f2 Blind bug
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid9454315 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322 \hich\af2\dbch\af12\loch\f2 Web bug
\par
\par
\par \hich\af2\dbch\af12\loch\f2 81. A packet is sent to a router that does not have the pac\hich\af2\dbch\af12\loch\f2 ket\hich\f2 \rquote \loch\f2 s destination address in its route table. How will the packet get to its proper destination?
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid3368493 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322 \hich\af2\dbch\af12\loch\f2 Gateway of last resort
\par \hich\af2\dbch\af12\loch\f2 Root internet servers
\par \hich\af2\dbch\af12\loch\f2 Reverse DNS
\par \hich\af2\dbch\af12\loch\f2 Border Gateway Protocol
\par
\par
\par \hich\af2\dbch\af12\loch\f2 82. Harold is a security analyst who has just r\hich\af2\dbch\af12\loch\f2 un the rdisk/s command to grab the backup SAM file on a computer. Where should Harold navigate on the computer to find the file?
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid14498309 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322 \hich\af2\dbch\af12\loch\f2 %system$root%\\repair
\par \hich\af2\dbch\af12\loch\f2 %systemroom%\\system32\\drivers\\etc
\par \hich\af2\dbch\af12\loch\f2 %systemroot%\\system32\\LSA
\par \hich\af2\dbch\af12\loch\f2 %systemroot%\\LSA
\par
\par
\par \hich\af2\dbch\af12\loch\f2 83. Frank is working o\hich\af2\dbch\af12\loch\f2
n a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by temporary IDS h
\hich\af2\dbch\af12\loch\f2 e\hich\af2\dbch\af12\loch\f2 set up, he notices a number of items that show up as unknown but questionable in his logs. He looks up the behavior on the Internet, but cannot find anything related.
\par \hich\af2\dbch\af12\loch\f2 What organization should Frank submit the log to find out if it is a new vulnerability \hich\af2\dbch\af12\loch\f2 or not
\par
\par \hich\af2\dbch\af12\loch\f2 RIPE
\par \hich\af2\dbch\af12\loch\f2 APIPA
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid14040290 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322 \hich\af2\dbch\af12\loch\f2 CVE
\par \hich\af2\dbch\af12\loch\f2 IANA
\par
\par
\par \hich\af2\dbch\af12\loch\f2
84. For security reasons and to conserve the number of public IP addresses owned by his company, Jason uses NAT to translate the private IPs on his internal network to a private IP. Jason decides to use 192.169.0.0 through 192.169.255.255 for his interna
\hich\af2\dbch\af12\loch\f2 l\hich\af2\dbch\af12\loch\f2 IPs. Jason\hich\f2 \rquote \loch\f2 s company decides to pay for a security audit. Why would the security audit company recommend that Jason change his internal IP address scheme?
\par
\par \hich\af2\dbch\af12\loch\f2 His IP scheme includes too many Class C networks
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2367714 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322 \hich\af2\dbch\af12\loch\f2 His IP scheme does not fall under RFC 1918
\par \hich\af2\dbch\af12\loch\f2 Hi\hich\af2\dbch\af12\loch\f2 s IP scheme does not fall under RFC 19872
\par \hich\af2\dbch\af12\loch\f2 His IP scheme includes too many class B networks
\par
\par
\par \hich\af2\dbch\af12\loch\f2 85. After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid2367714 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322 \hich\af2\dbch\af12\loch\f2 Disable direct broadcasts
\par \hich\af2\dbch\af12\loch\f2 Enable direct broadcasts
\par \hich\af2\dbch\af12\loch\f2 Disable BGP
\par \hich\af2\dbch\af12\loch\f2 Enable BGP
\par
\par
\par \hich\af2\dbch\af12\loch\f2 86. Jessica works as a systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type o\hich\af2\dbch\af12\loch\f2
f scan is Jessica going to perform?
\par
\par \hich\af2\dbch\af12\loch\f2 Tracert
\par \hich\af2\dbch\af12\loch\f2 Smurf scan
\par {\*\xmlopen\xmlns2{\factoidname State}}\hich\af2\dbch\af12\loch\f2 Ping{\*\xmlclose} trace
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid16136886 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322 \hich\af2\dbch\af12\loch\f2 ICMP ping sweep
\par
\par
\par \hich\af2\dbch\af12\loch\f2 87.}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322 \hich\af2\dbch\af12\loch\f2
You have compromised a lower-level administrator account on an Active Directory network of a small company in {\*\xmlopen\xmlns2{\factoidname State}}{\*\xmlopen\xmlns2{\factoidname State}}\hich\af2\dbch\af12\loch\f2 Dallas{\*\xmlclose},
{\*\xmlopen\xmlns2{\factoidname State}}\hich\af2\dbch\af12\loch\f2 Texas{\*\xmlclose}{\*\xmlclose}. You\hich\af2\dbch\af12\loch\f2 discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe
\par \hich\af2\dbch\af12\loch\f2 What are you trying to accomplish here?
\par
\par \hich\af2\dbch\af12\loch\f2 Enumerate MX and A records from DNS
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12465016 \hich\af2\dbch\af12\loch\f2 Establish a remote connection to the Domain Controller}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12465016 \hich\af2\dbch\af12\loch\f2 Po\hich\af2\dbch\af12\loch\f2 ison the DNS records with false records
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid11420058 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12465016 \hich\af2\dbch\af12\loch\f2 Enumerate domain user accounts and built-in groups
\par
\par
\par \hich\af2\dbch\af12\loch\f2 88. George is performing security analysis for Hammo\hich\af2\dbch\af12\loch\f2 \hich\f2 nd and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as \'93\loch\f2 \hich\f2
stealthy\'94\loch\f2 as possible during the scan. Why would a scanner like Nessus not be recommended in this situation?
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid4482737 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12465016 \hich\af2\dbch\af12\loch\f2 Nessus is too loud
\par \hich\af2\dbch\af12\loch\f2 There are no\hich\af2\dbch\af12\loch\f2 \hich\f2 ways of performing a \'93\loch\f2 \hich\f2 stealthy\'94\loch\f2 wireless scan
\par \hich\af2\dbch\af12\loch\f2 Nessus is not a network scanner
\par \hich\af2\dbch\af12\loch\f2 Nessus cannot perform wireless testing
\par
\par
\par \hich\af2\dbch\af12\loch\f2 89. After attending a security class, William decides to set up a dual-honed proxy for the network of his small business. He installs an\hich\af2\dbch\af12\loch\f2
extra network card on his computer, creates ACL rules, and enables packet forwarding. William also turns a sniffer to monitor traffic on his new proxy. He quickly notices source IPs he added to his ACL are still able to send to his network and through
\hich\af2\dbch\af12\loch\f2 h\hich\af2\dbch\af12\loch\f2 is proxy. Why is William seeing this result?
\par
\par \hich\af2\dbch\af12\loch\f2 Only one network card should be used for a dual-homed proxy
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid1850839 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12465016 \hich\af2\dbch\af12\loch\f2 Packet forwarding should be disabled
\par \hich\af2\dbch\af12\loch\f2 Dual-homed proxies need at least three network cards, two for functionality and one for monitoring
\par \hich\af2\dbch\af12\loch\f2 ACL rules \hich\af2\dbch\af12\loch\f2 should not be used with a proxy
\par
\par
\par \hich\af2\dbch\af12\loch\f2 90. Tom works as Unix systems }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10694955 \hich\af2\dbch\af12\loch\f2 administrator for Jacob and Co. H}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12465016
\hich\af2\dbch\af12\loch\f2 e needs to run brute force attacks on the passwords of his users to ensure that they are abiding by the corporate password policy. Where can Tom find these p\hich\af2\dbch\af12\loch\f2 asswords?
\par
\par \hich\af2\dbch\af12\loch\f2 /drivers/etc/shadow
\par \hich\af2\dbch\af12\loch\f2 /etc/pwd
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12483756 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12465016 \hich\af2\dbch\af12\loch\f2 /etc/passwd
\par \hich\af2\dbch\af12\loch\f2 /root/hidden
\par
\par
\par \hich\af2\dbch\af12\loch\f2 91. What is the smallest possible Windows shellcode?
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8213046 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12465016 \hich\af2\dbch\af12\loch\f2 800 bytes
\par \hich\af2\dbch\af12\loch\f2 1000 bytes
\par \hich\af2\dbch\af12\loch\f2 600 bytes
\par \hich\af2\dbch\af12\loch\f2 100 bytes
\par
\par \hich\af2\dbch\af12\loch\f2 92. Why would a Web administrator remove the .htr extension from the list of application extensions on IIS?
\par
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid10378238 \hich\af2\dbch\af12\loch\f2 (X)}{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid12465016 \hich\af2\dbch\af12\loch\f2 Disallow users from changing their passwords through a web page
\par \hich\af2\dbch\af12\loch\f2 Prevent users from accessing server side includes which are a security threat
\par \hich\af2\dbch\af12\loch\f2 Pr\hich\af2\dbch\af12\loch\f2 event users from printing documents through Internet printers
\par \hich\af2\dbch\af12\loch\f2 Prevent users from bypassing access control lists on the Web server
\par \hich\af2\dbch\af12\loch\f2
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322
\par }{\rtlch\fcs1 \af2\afs20 \ltrch\fcs0 \f2\fs20\insrsid8023322\charrsid8023322
\par }{\*\themedata 504b030414000600080000002100e9de0fbfff0000001c020000130000005b436f6e74656e745f54797065735d2e786d6cac91cb4ec3301045f748fc83e52d4a
9cb2400825e982c78ec7a27cc0c8992416c9d8b2a755fbf74cd25442a820166c2cd933f79e3be372bd1f07b5c3989ca74aaff2422b24eb1b475da5df374fd9ad
5689811a183c61a50f98f4babebc2837878049899a52a57be670674cb23d8e90721f90a4d2fa3802cb35762680fd800ecd7551dc18eb899138e3c943d7e503b6
b01d583deee5f99824e290b4ba3f364eac4a430883b3c092d4eca8f946c916422ecab927f52ea42b89a1cd59c254f919b0e85e6535d135a8de20f20b8c12c3b0
0c895fcf6720192de6bf3b9e89ecdbd6596cbcdd8eb28e7c365ecc4ec1ff1460f53fe813d3cc7f5b7f020000ffff0300504b030414000600080000002100a5d6
a7e7c0000000360100000b0000005f72656c732f2e72656c73848fcf6ac3300c87ef85bd83d17d51d2c31825762fa590432fa37d00e1287f68221bdb1bebdb4f
c7060abb0884a4eff7a93dfeae8bf9e194e720169aaa06c3e2433fcb68e1763dbf7f82c985a4a725085b787086a37bdbb55fbc50d1a33ccd311ba548b6309512
0f88d94fbc52ae4264d1c910d24a45db3462247fa791715fd71f989e19e0364cd3f51652d73760ae8fa8c9ffb3c330cc9e4fc17faf2ce545046e37944c69e462
a1a82fe353bd90a865aad41ed0b5b8f9d6fd010000ffff0300504b0304140006000800000021006b799616830000008a0000001c0000007468656d652f746865
6d652f7468656d654d616e616765722e786d6c0ccc4d0ac3201040e17da17790d93763bb284562b2cbaebbf600439c1a41c7a0d29fdbd7e5e38337cedf14d59b
4b0d592c9c070d8a65cd2e88b7f07c2ca71ba8da481cc52c6ce1c715e6e97818c9b48d13df49c873517d23d59085adb5dd20d6b52bd521ef2cdd5eb9246a3d8b
4757e8d3f729e245eb2b260a0238fd010000ffff0300504b03041400060008000000210030dd4329a8060000a41b0000160000007468656d652f7468656d652f
7468656d65312e786d6cec594f6fdb3614bf0fd87720746f6327761a07758ad8b19b2d4d1bc46e871e698996d850a240d2497d1bdae38001c3ba618715d86d87
615b8116d8a5fb34d93a6c1dd0afb0475292c5585e9236d88aad3e2412f9e3fbff1e1fa9abd7eec70c1d1221294fda5efd72cd4324f1794093b0eddd1ef62fad
79482a9c0498f184b4bd2991deb58df7dfbb8ad755446282607d22d771db8b944ad79796a40fc3585ee62949606ecc458c15bc8a702910f808e8c66c69b9565b
5d8a314d3c94e018c8de1a8fa94fd05093f43672e23d06af89927ac06762a049136785c10607758d9053d965021d62d6f6804fc08f86e4bef210c352c144dbab
999fb7b4717509af678b985ab0b6b4ae6f7ed9ba6c4170b06c788a705430adf71bad2b5b057d03606a1ed7ebf5babd7a41cf00b0ef83a6569632cd467faddec9
699640f6719e76b7d6ac355c7c89feca9cccad4ea7d36c65b258a206641f1b73f8b5da6a6373d9c11b90c537e7f08dce66b7bbeae00dc8e257e7f0fd2badd586
8b37a088d1e4600ead1ddaef67d40bc898b3ed4af81ac0d76a197c86826828a24bb318f3442d8ab518dfe3a20f000d6458d104a9694ac6d88728eee2782428d6
0cf03ac1a5193be4cbb921cd0b495fd054b5bd0f530c1931a3f7eaf9f7af9e3f45c70f9e1d3ff8e9f8e1c3e3073f5a42ceaa6d9c84e5552fbffdeccfc71fa33f
9e7ef3f2d117d57859c6fffac327bffcfc793510d26726ce8b2f9ffcf6ecc98baf3efdfdbb4715f04d814765f890c644a29be408edf3181433567125272371be
15c308d3f28acd249438c19a4b05fd9e8a1cf4cd296699771c393ac4b5e01d01e5a30a787d72cf1178108989a2159c77a2d801ee72ce3a5c545a6147f32a9979
3849c26ae66252c6ed637c58c5bb8b13c7bfbd490a75330f4b47f16e441c31f7184e140e494214d273fc80900aedee52ead87597fa824b3e56e82e451d4c2b4d
32a423279a668bb6690c7e9956e90cfe766cb37b077538abd27a8b1cba48c80acc2a841f12e698f13a9e281c57911ce298950d7e03aba84ac8c154f8655c4f2a
f074481847bd804859b5e696007d4b4edfc150b12addbecba6b18b148a1e54d1bc81392f23b7f84137c2715a851dd0242a633f900710a218ed715505dfe56e86
e877f0034e16bafb0e258ebb4faf06b769e888340b103d331115bebc4eb813bf83291b63624a0d1475a756c734f9bbc2cd28546ecbe1e20a3794ca175f3fae90
fb6d2dd99bb07b55e5ccf68942bd0877b23c77b908e8db5f9db7f024d9239010f35bd4bbe2fcae387bfff9e2bc289f2fbe24cfaa301468dd8bd846dbb4ddf1c2
ae7b4c191ba8292337a469bc25ec3d411f06f53a73e224c5292c8de0516732307070a1c0660d125c7d44553488700a4d7bddd3444299910e254ab984c3a219ae
a4adf1d0f82b7bd46cea4388ad1c12ab5d1ed8e1153d9c9f350a3246aad01c6873462b9ac05999ad5cc988826eafc3acae853a33b7ba11cd1445875ba1b236b1
399483c90bd560b0b0263435085a21b0f22a9cf9356b38ec6046026d77eba3dc2dc60b17e92219e180643ed27acffba86e9c94c7ca9c225a0f1b0cfae0788ad5
4adc5a9aec1b703b8b93caec1a0bd8e5de7b132fe5113cf312503b998e2c2927274bd051db6b35979b1ef271daf6c6704e86c73805af4bdd476216c26593af84
0dfb5393d964f9cc9bad5c313709ea70f561ed3ea7b053075221d51696910d0d339585004b34272bff7213cc7a510a5454a3b349b1b206c1f0af490176745d4b
c663e2abb2b34b23da76f6352ba57ca2881844c1111ab189d8c7e07e1daaa04f40255c77988aa05fe06e4e5bdb4cb9c5394bbaf28d98c1d971ccd20867e556a7
689ec9166e0a522183792b8907ba55ca6e943bbf2a26e52f48957218ffcf54d1fb09dc3eac04da033e5c0d0b8c74a6b43d2e54c4a10aa511f5fb021a07533b20
5ae07e17a621a8e082dafc17e450ffb739676998b48643a4daa7211214f623150942f6a02c99e83b85583ddbbb2c4996113211551257a656ec1139246ca86be0
aadedb3d1441a89b6a929501833b197fee7b9641a3503739e57c732a59b1f7da1cf8a73b1f9bcca0945b874d4393dbbf10b1680f66bbaa5d6f96e77b6f59113d
316bb31a795600b3d256d0cad2fe354538e7566b2bd69cc6cbcd5c38f0e2bcc63058344429dc2121fd07f63f2a7c66bf76e80d75c8f7a1b622f878a18941d840
545fb28d07d205d20e8ea071b283369834296bdaac75d256cb37eb0bee740bbe278cad253b8bbfcf69eca23973d939b97891c6ce2cecd8da8e2d343578f6648a
c2d0383fc818c798cf64e52f597c740f1cbd05df0c264c49134cf09d4a60e8a107260f20f92d47b374e32f000000ffff0300504b030414000600080000002100
0dd1909fb60000001b010000270000007468656d652f7468656d652f5f72656c732f7468656d654d616e616765722e786d6c2e72656c73848f4d0ac2301484f7
8277086f6fd3ba109126dd88d0add40384e4350d363f2451eced0dae2c082e8761be9969bb979dc9136332de3168aa1a083ae995719ac16db8ec8e4052164e89
d93b64b060828e6f37ed1567914b284d262452282e3198720e274a939cd08a54f980ae38a38f56e422a3a641c8bbd048f7757da0f19b017cc524bd62107bd500
1996509affb3fd381a89672f1f165dfe514173d9850528a2c6cce0239baa4c04ca5bbabac4df000000ffff0300504b01022d0014000600080000002100e9de0f
bfff0000001c0200001300000000000000000000000000000000005b436f6e74656e745f54797065735d2e786d6c504b01022d0014000600080000002100a5d6
a7e7c0000000360100000b00000000000000000000000000300100005f72656c732f2e72656c73504b01022d00140006000800000021006b799616830000008a
0000001c00000000000000000000000000190200007468656d652f7468656d652f7468656d654d616e616765722e786d6c504b01022d00140006000800000021
0030dd4329a8060000a41b00001600000000000000000000000000d60200007468656d652f7468656d652f7468656d65312e786d6c504b01022d001400060008
00000021000dd1909fb60000001b0100002700000000000000000000000000b20900007468656d652f7468656d652f5f72656c732f7468656d654d616e616765722e786d6c2e72656c73504b050600000000050005005d010000ad0a00000000}
{\*\colorschememapping 3c3f786d6c2076657273696f6e3d22312e302220656e636f64696e673d225554462d3822207374616e64616c6f6e653d22796573223f3e0d0a3c613a636c724d
617020786d6c6e733a613d22687474703a2f2f736368656d61732e6f70656e786d6c666f726d6174732e6f72672f64726177696e676d6c2f323030362f6d6169
6e22206267313d226c743122207478313d22646b3122206267323d226c743222207478323d22646b322220616363656e74313d22616363656e74312220616363
656e74323d22616363656e74322220616363656e74333d22616363656e74332220616363656e74343d22616363656e74342220616363656e74353d22616363656e74352220616363656e74363d22616363656e74362220686c696e6b3d22686c696e6b2220666f6c486c696e6b3d22666f6c486c696e6b222f3e}
{\*\latentstyles\lsdstimax267\lsdlockeddef0\lsdsemihiddendef1\lsdunhideuseddef1\lsdqformatdef0\lsdprioritydef99{\lsdlockedexcept \lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority0 \lsdlocked0 Normal;
\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority9 \lsdlocked0 heading 1;\lsdqformat1 \lsdpriority9 \lsdlocked0 heading 2;\lsdqformat1 \lsdpriority9 \lsdlocked0 heading 3;\lsdqformat1 \lsdpriority9 \lsdlocked0 heading 4;
\lsdqformat1 \lsdpriority9 \lsdlocked0 heading 5;\lsdqformat1 \lsdpriority9 \lsdlocked0 heading 6;\lsdqformat1 \lsdpriority9 \lsdlocked0 heading 7;\lsdqformat1 \lsdpriority9 \lsdlocked0 heading 8;\lsdqformat1 \lsdpriority9 \lsdlocked0 heading 9;
\lsdpriority39 \lsdlocked0 toc 1;\lsdpriority39 \lsdlocked0 toc 2;\lsdpriority39 \lsdlocked0 toc 3;\lsdpriority39 \lsdlocked0 toc 4;\lsdpriority39 \lsdlocked0 toc 5;\lsdpriority39 \lsdlocked0 toc 6;\lsdpriority39 \lsdlocked0 toc 7;
\lsdpriority39 \lsdlocked0 toc 8;\lsdpriority39 \lsdlocked0 toc 9;\lsdqformat1 \lsdpriority35 \lsdlocked0 caption;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority10 \lsdlocked0 Title;\lsdpriority1 \lsdlocked0 Default Paragraph Font;
\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority11 \lsdlocked0 Subtitle;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority22 \lsdlocked0 Strong;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority20 \lsdlocked0 Emphasis;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority59 \lsdlocked0 Table Grid;\lsdunhideused0 \lsdlocked0 Placeholder Text;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority1 \lsdlocked0 No Spacing;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority60 \lsdlocked0 Light Shading;\lsdsemihidden0 \lsdunhideused0 \lsdpriority61 \lsdlocked0 Light List;\lsdsemihidden0 \lsdunhideused0 \lsdpriority62 \lsdlocked0 Light Grid;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority63 \lsdlocked0 Medium Shading 1;\lsdsemihidden0 \lsdunhideused0 \lsdpriority64 \lsdlocked0 Medium Shading 2;\lsdsemihidden0 \lsdunhideused0 \lsdpriority65 \lsdlocked0 Medium List 1;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority66 \lsdlocked0 Medium List 2;\lsdsemihidden0 \lsdunhideused0 \lsdpriority67 \lsdlocked0 Medium Grid 1;\lsdsemihidden0 \lsdunhideused0 \lsdpriority68 \lsdlocked0 Medium Grid 2;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority69 \lsdlocked0 Medium Grid 3;\lsdsemihidden0 \lsdunhideused0 \lsdpriority70 \lsdlocked0 Dark List;\lsdsemihidden0 \lsdunhideused0 \lsdpriority71 \lsdlocked0 Colorful Shading;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority72 \lsdlocked0 Colorful List;\lsdsemihidden0 \lsdunhideused0 \lsdpriority73 \lsdlocked0 Colorful Grid;\lsdsemihidden0 \lsdunhideused0 \lsdpriority60 \lsdlocked0 Light Shading Accent 1;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority61 \lsdlocked0 Light List Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdpriority62 \lsdlocked0 Light Grid Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdpriority63 \lsdlocked0 Medium Shading 1 Accent 1;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority64 \lsdlocked0 Medium Shading 2 Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdpriority65 \lsdlocked0 Medium List 1 Accent 1;\lsdunhideused0 \lsdlocked0 Revision;
\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority34 \lsdlocked0 List Paragraph;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority29 \lsdlocked0 Quote;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority30 \lsdlocked0 Intense Quote;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority66 \lsdlocked0 Medium List 2 Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdpriority67 \lsdlocked0 Medium Grid 1 Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdpriority68 \lsdlocked0 Medium Grid 2 Accent 1;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority69 \lsdlocked0 Medium Grid 3 Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdpriority70 \lsdlocked0 Dark List Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdpriority71 \lsdlocked0 Colorful Shading Accent 1;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority72 \lsdlocked0 Colorful List Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdpriority73 \lsdlocked0 Colorful Grid Accent 1;\lsdsemihidden0 \lsdunhideused0 \lsdpriority60 \lsdlocked0 Light Shading Accent 2;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority61 \lsdlocked0 Light List Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdpriority62 \lsdlocked0 Light Grid Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdpriority63 \lsdlocked0 Medium Shading 1 Accent 2;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority64 \lsdlocked0 Medium Shading 2 Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdpriority65 \lsdlocked0 Medium List 1 Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdpriority66 \lsdlocked0 Medium List 2 Accent 2;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority67 \lsdlocked0 Medium Grid 1 Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdpriority68 \lsdlocked0 Medium Grid 2 Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdpriority69 \lsdlocked0 Medium Grid 3 Accent 2;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority70 \lsdlocked0 Dark List Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdpriority71 \lsdlocked0 Colorful Shading Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdpriority72 \lsdlocked0 Colorful List Accent 2;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority73 \lsdlocked0 Colorful Grid Accent 2;\lsdsemihidden0 \lsdunhideused0 \lsdpriority60 \lsdlocked0 Light Shading Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdpriority61 \lsdlocked0 Light List Accent 3;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority62 \lsdlocked0 Light Grid Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdpriority63 \lsdlocked0 Medium Shading 1 Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdpriority64 \lsdlocked0 Medium Shading 2 Accent 3;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority65 \lsdlocked0 Medium List 1 Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdpriority66 \lsdlocked0 Medium List 2 Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdpriority67 \lsdlocked0 Medium Grid 1 Accent 3;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority68 \lsdlocked0 Medium Grid 2 Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdpriority69 \lsdlocked0 Medium Grid 3 Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdpriority70 \lsdlocked0 Dark List Accent 3;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority71 \lsdlocked0 Colorful Shading Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdpriority72 \lsdlocked0 Colorful List Accent 3;\lsdsemihidden0 \lsdunhideused0 \lsdpriority73 \lsdlocked0 Colorful Grid Accent 3;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority60 \lsdlocked0 Light Shading Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdpriority61 \lsdlocked0 Light List Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdpriority62 \lsdlocked0 Light Grid Accent 4;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority63 \lsdlocked0 Medium Shading 1 Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdpriority64 \lsdlocked0 Medium Shading 2 Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdpriority65 \lsdlocked0 Medium List 1 Accent 4;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority66 \lsdlocked0 Medium List 2 Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdpriority67 \lsdlocked0 Medium Grid 1 Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdpriority68 \lsdlocked0 Medium Grid 2 Accent 4;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority69 \lsdlocked0 Medium Grid 3 Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdpriority70 \lsdlocked0 Dark List Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdpriority71 \lsdlocked0 Colorful Shading Accent 4;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority72 \lsdlocked0 Colorful List Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdpriority73 \lsdlocked0 Colorful Grid Accent 4;\lsdsemihidden0 \lsdunhideused0 \lsdpriority60 \lsdlocked0 Light Shading Accent 5;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority61 \lsdlocked0 Light List Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdpriority62 \lsdlocked0 Light Grid Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdpriority63 \lsdlocked0 Medium Shading 1 Accent 5;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority64 \lsdlocked0 Medium Shading 2 Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdpriority65 \lsdlocked0 Medium List 1 Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdpriority66 \lsdlocked0 Medium List 2 Accent 5;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority67 \lsdlocked0 Medium Grid 1 Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdpriority68 \lsdlocked0 Medium Grid 2 Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdpriority69 \lsdlocked0 Medium Grid 3 Accent 5;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority70 \lsdlocked0 Dark List Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdpriority71 \lsdlocked0 Colorful Shading Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdpriority72 \lsdlocked0 Colorful List Accent 5;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority73 \lsdlocked0 Colorful Grid Accent 5;\lsdsemihidden0 \lsdunhideused0 \lsdpriority60 \lsdlocked0 Light Shading Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdpriority61 \lsdlocked0 Light List Accent 6;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority62 \lsdlocked0 Light Grid Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdpriority63 \lsdlocked0 Medium Shading 1 Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdpriority64 \lsdlocked0 Medium Shading 2 Accent 6;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority65 \lsdlocked0 Medium List 1 Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdpriority66 \lsdlocked0 Medium List 2 Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdpriority67 \lsdlocked0 Medium Grid 1 Accent 6;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority68 \lsdlocked0 Medium Grid 2 Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdpriority69 \lsdlocked0 Medium Grid 3 Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdpriority70 \lsdlocked0 Dark List Accent 6;
\lsdsemihidden0 \lsdunhideused0 \lsdpriority71 \lsdlocked0 Colorful Shading Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdpriority72 \lsdlocked0 Colorful List Accent 6;\lsdsemihidden0 \lsdunhideused0 \lsdpriority73 \lsdlocked0 Colorful Grid Accent 6;
\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority19 \lsdlocked0 Subtle Emphasis;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority21 \lsdlocked0 Intense Emphasis;
\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority31 \lsdlocked0 Subtle Reference;\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority32 \lsdlocked0 Intense Reference;
\lsdsemihidden0 \lsdunhideused0 \lsdqformat1 \lsdpriority33 \lsdlocked0 Book Title;\lsdpriority37 \lsdlocked0 Bibliography;\lsdqformat1 \lsdpriority39 \lsdlocked0 TOC Heading;}}{\*\datastore 010500000200000018000000
4d73786d6c322e534158584d4c5265616465722e362e3000000000000000000000060000
d0cf11e0a1b11ae1000000000000000000000000000000003e000300feff090006000000000000000000000001000000010000000000000000100000feffffff00000000feffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
fffffffffffffffffdfffffffeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
ffffffffffffffffffffffffffffffff52006f006f007400200045006e00740072007900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000016000500ffffffffffffffffffffffff0c6ad98892f1d411a65f0040963251e5000000000000000000000000d090
10e6f7afcc01feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff0000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000105000000000000}}