Ethical Hacking

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which HTTP error informs you the server understands the request but refuses to comply?

403 Forbidden

Which of the following IEEE projects was developed to create LAN and WAN standards?

802

A standard that addresses the issue of authentication

802.1x

Which of the following encryption standards is part of the NSA's suite B cryptographic algorithms and is validated strong enough to protect classified data?

AES-256

Which IDS system uses a baseline of normal activity and then sends an alert if the activity deviates significantly from this baseline?

Anomaly-based IDS

What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?

BIOS-based rootkit

Adobe System's ColdFusion uses its proprietary tags, which are written in which of the following languages?

CFML

For a Windows computer to be able to access a *nix resource, which of the following must be enabled on both systems?

CIFS

A standardized protocol that replaced SMB in Windows 2000 Server and later

Common internet file system

Which of the following sits between the Internet and the internal network and is sometimes referred to as a perimeter network?

DMZ

What area of a network is a major area of potential vulnerability because of the use of URLs?

DNS

Data packets are spread simultaneously over multiple frequencies instead of hopping to other frequencies

DSSS

Which of the following application tests analyzes a running application for vulnerabilities?

Dynamic Application Security Testing

An enhancement to PPP, that was designed to allow a company to select its authentication method

EAP

Which of the following protocols is an enhancement to PPP, and was designed to allow a company to select its authentication method?

EAP

Data hops to other frequencies to avoid interference that might occur over a frequency band

FHSS

In a NULL scan, all packet flags are turned on.

False

Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012 have most services and features enabled by default.

False

Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux

Fping

What configuration mode allows a Cisco administrator to configure router settings that affect the overall operations of the router?

Global configuration mode

Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets

Hping

Which type of device monitors a network's hardware so that security administrators can identify attacks in progress and stop them?

IDS

Technology is restricted to a single room or line of sight because this light spectrum cannot penetrate walls

Infrared (IR)

If a Cisco administrator needs to configure a serial or Fast Ethernet port, which configuration mode should they use?

Interface configuration mode

What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android, Windows Mobile, and the Apple iPhone OS?

Java-based

Which of the following is a common Linux rootkit?

Linux Rootkit 5

To determine whether a system could be vulnerable to an RPC-related issue, which of the following tools can be used?

MBSA

A device that performs more than one function, such as printing and faxing is called which of the following?

MFD

An OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users

Mandatory access control

What router feature provides basic security by mapping internal private IP addresses to public external IP addresses, essentially hiding the internal infrastructure from unauthorized personnel?

NAT

The original utility from which OpenVas was developed

Nessus

A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP

NetBEUI

Which of the following protocols does NetBios use to access a network resource?

NetBEUI

What tool can be used to read and write data to ports over a network?

Netcat

A popular port scanners that has the ability to use a GUI front end

Nmap

Which of the following interfaces is a standard database access method, developed by SQL Access Group, that allows an application to access data stored in a database management system (DBMS)?

ODBC

Which of the following interfaces, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system (DBMS)?

OLE DB

An open-source fork of Nessus

OpenVAS

Which of the following EAP methods uses TLS to authenticate the server to the client, but not the client to the server?

PEAP

What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?

Piggybacking

What encryption algorithm can be used for both encryption and digital signing, uses a one-way function, and is still widely used in e-commerce?

RSA

Which of the following cross-site scripting vulnerabilities types relies on social engineering to trick a user into visiting a maliciously crafted link or URL?

Reflected

Which of the following systems should be used when equipment monitoring and automation is critical?

SCADA

The name used to identify a WLAN

SSID

An open-source implementation of CIFS

Samba

Which of the following is an open-source implementation of CIFS?

Samba

A large organization that is responsible for sensitive or critical data may elect to create which of the following to do damage assessment, risk remediation, and legal consultation?

Security Operations Center

Used to share files and usually runs on top of NetBIOS, NetBEUI, or TCP/IP

Server message block

Which of the following application tests analyzes an application's source code for vulnerabilities, and is therefore only possible when the source code of an application is available?

Static Application Security Testing

Which of the following cross-site scripting vulnerabilities types is especially harmful because it can be delivered to subsequent users of the application?

Stored

In 2007 became Windows new standard to deploy and manage servers alongside updated patch-management functionality

System center configuration manager

Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005

Systems management server

ECC is an efficient algorithm requiring few hardware resources, so it's a perfect candidate for wireless devices and cell phones.

True

It is possible to have a wireless network that does not connect to a wired network.

True

Port scanning is a method of finding out which services a host computer offers.

True

Routers operate at the Network layer of the TCP/IP protocol stack.

True

There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.

True

Wget is a *nix system command that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet.

True

When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?

User-level security

A Windows client/server technology introduced in 2005 used to manage patching and updating system software from the network

Windows software update services

A certificate contains a unique serial number and must follow which standard that describes the creating of a certificate?

X.509

When hackers drive around or investigate an area with an antenna, they are usually looking for which component of a wireless network?

access point

An independent WLAN without an AP

ad-hoc network

SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?

air gap

What type of firewall inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection firewall does?

application-aware firewall

Amount of code a computer system exposes to unauthenticated outsiders

attack surface

What is the specific act of checking a user's privileges to understand if they should or should not have access to a page, field, resource, or action in an application?

authorization

Which of the following refers to the flow a user is expected to follow in an application to accomplish a goal?

business logic

Which of the following is contained in a wireless frequency band and breaks up the band into smaller frequency ranges?

channels

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?

ciphertext-only

A port state which does not allow entry or access to a service

closed port

Which of the following does Object Linking and Embedding Database (OLE DB) rely on that allows an application to access data stored on an external device?

connection strings

Which of the following is a text file generated by a Web server and stored on a user's browser?

cookie

Which of the following is the process of converting ciphertext back into plaintext?

decryption

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

domain controllers

What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?

dumpster diving

Which of the following is a mathematical function or program that works with a key?

encryption algorithm

AES uses a 128-bit key and is used in PGP encryption software.

false

A port state that may indicate a firewall is being used to allow specified traffic into or out of the network

filtered port

Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

firmware

Which of the following terms is the rate at which a sound wave repeat?

frequency

Which frequency band is used by commercial AM radio stations?

medium frequency (MF)

Defines how data is placed on a carrier signal

modulation

A technology that uses microwave radio band frequencies to transmit data

narrowband

To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?

nc -h

What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT) file system?

no ACL support

Which of the following is considered to be the most critical SQL vulnerability?

null SA password

A port state that allows access to applications and can be vulnerable

open port

What type of an IDS is being used when it does not take any action to stop or prevent an activity occurring?

passive system

Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts

ping sweep

Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly

port scanning

An interprocess communication mechanism that allows a program running on one host to run code on a remote host

remote procedure call

Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?

router

Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?

shoulder surfing

Data is spread across a large-frequency bandwidth instead of traveling across just one frequency band

spread spectrum

In 802.11, which of the following is an addressable unit?

station (STA)

Which type of symmetric algorithm operates on plaintext one bit at a time?

stream ciphers

Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?

symmetric

Red Hat and Fedora Linux use what command to update and manage their RPM packages?

yum

Which process enables you to see all the host computers on a network and basically give you a diagram of an organization's network?

zone transfers


Conjuntos de estudio relacionados

Chapter 39: Nutritional Problems

View Set

Med Surg EKG/Cardiac Rhythms Quiz

View Set