Ethical hacking final lol

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the difference between a public key and a private key? a. A private key is a secret key known only by the key owner. b. A public key is openly available. c. They are the same. d. They are symmetric.

a. A private key is a secret key known only by the key owner.

Which of the following can be used as a countermeasure for wireless attacks? a. Assign static IP addresses to wireless clients. b. Use wardriving software. c. Enable SSID broadcasts. d. Enable WPS.

a. Assign static IP addresses to wireless clients.

Which language is not considered an object-oriented programming language? a. C b. Perl c. Object COBOL d. Java

a. C

Which of the following is not a best practice in regards to password policies? a. Common words b. Rotation c. Complexity d. Minimum length

a. Common words

A security professional at a large corporation needs to transmit legal documentation over the internet. The professional does not want this sensitive data readily viewable if intercepted. What should the professional implement? a. Encryption Algorithm. b. Plaintext. c. Cleartext. d. Roman Cipher.

a. Encryption Algorithm.

Wapiti uses fuzzing. What is fuzzing? a. Fuzzing is an attempt to inject data into whatever will accept it. b. Fuzzing is the process of inspecting code. c. Fuzzing is a mixture of a black box approach and a white box approach to testing. d. Fuzzing is the detection of common forms that allow uploads of command injection.

a. Fuzzing is an attempt to inject data into whatever will accept it.

WiFI Pineapple has been called "a Swiss-army knife for wireless hacking" for its many features. Which of the following is not a task that WiFi Pineapple can accomplish? a. Include the add-on GUI front-end called Fern WIFI Cracker. b. Allow an attacker to emulate any network that a client requests. c. Set up fake APs to social-engineer users or confuse attackers using airbase-ng. d. Perform scans for wireless access points.

a. Include the add-on GUI front-end called Fern WIFI Cracker.

What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android, Windows Mobile, and the Apple iPhone OS? a. Java b. Python c. Perl d. C++

a. Java

Which of the following defines how data is placed on a carrier signal? a. Modulation b. Multiplexing c. Supplication d. Wardriving

a. Modulation

What is the most common motivator behind today's cyber security attacks? a. Money b. Jobs c. Curiosity d. Notoriety

a. Money

A Linux administrator wants to share files between Windows and Linux servers. What protocol should they use? a. Samba b. SMBv3 c. NetBIOS d. CIFS

a. Samba

Which of the following is not a best practice for protecting embedded OS's? a. Scan b. Inventory c. Encryption d. Least Privilege

a. Scan

What type of cryptography is demonstrated by reversing the alphabet, so A becomes Z, B becomes Y, and so on? a. Substitution cipher. b. Diffie Helman cipher. c. Complete cipher. d. Roman cipher

a. Substitution cipher.

What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters? a. brute force. b. dictionary. c. replay. d. ciphertext-only.

a. brute force.

What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS systems? a. null session b. exit session c. null system d. net session

a. null session

Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources? a. router b. host c. rootkit d. driver

a. router

Wireless technology is part of daily life. Which of the following is not an example of wireless technology? a. Fiber-optic communications b. Smart cars c. Garage door openers d. Baby monitors

a. Fiber-optic communications

Which type of XSS vulnerability is especially harmful? a. Stored because it can be delivered to subsequent users of the application. b. Reflected because it results from a server accepting untrusted, unvalidated input. c. Stored because it relies on social engineering to trick a user into visiting a maliciously crafted link or URL. d. Reflected because the attacker's goal is to execute code on a remote user's computer.

a. Stored because it can be delivered to subsequent users of the application.

A systems administrator is trying to harden an externally facing DNS server and wants to disable every port except for DNS. Which port should they leave open? a. 3389 TCP b. 53 UDP c. 445 TCP d. 1025-1039 TCP/UDP

b. 53 UDP

What benefit does object-oriented programming offer? a. Modularity b. All are benefits of object-oriented programming c. Inheritance d. Scalability

b. All are benefits of object-oriented programming

Why should security professionals have at least a little knowledge about the Apache Web Server? a. Apache is simple and quick to learn. b. Apache Web Server is said to run more Web servers than IIS. c. Apache is rare and expensive. d. Apache knowledge easily translates from one OS to another due to its singular layout.

b. Apache Web Server is said to run more Web servers than IIS.

Which type of algorithm uses two keys that are mathematically related? a. Enigma b. Asymmetric. c. Symmetric. d. Roman

b. Asymmetric.

Which malware targeted medical systems due to the problems with patching? a. QNX b. Conficker c. psyb0t d. Y2K

b. Conficker

Which of the following is the most intrusive? a. Enumeration Passive reconnaissance b. Enumeration c. Footprinting d. Port scanning

b. Enumeration

Third-party media players on webpages were often problematic and proved to be security risks, but are no longer needed due to which version of HTML? a. HTML 4.01 b. HTML5 c. HTML 2.0 d. HTML 3.2

b. HTML5

What does the "NBT" part of "NBTscan" stand for? a. NetBIOS over Transport b. NetBIOS over TCP/IP c. NetBIOS Test d. NetBIOS Transfer

b. NetBIOS over TCP/IP

Which of the following operating systems is considered the most secure? a. Windows b. None of these are more secure than the others c. Android d. Linux

b. None of these are more secure than the others

What is a logical goal for security professionals? a. Use foolproof countermeasures to protect the network and prevent attacks. b. Protect a network and make it difficult for attackers to break into it. c. Completely prevent attackers from breaking into a network. d. All of these are logical goals for security professionals.

b. Protect a network and make it difficult for attackers to break into it.

What kind of encryption can PGP use? a. Purple. b. RSA. c. Bombe. d. S/MIME.

b. RSA.

Which of the following Windows utilities includes a suite of tools to help administrators deploy and manage servers and even allows for administrators to control mobile devices running Android, iOS, and Windows Mobile OS? a. AUS b. SCCM c. WSUS d. SMS

b. SCCM

What type of useful tools can a security tester find available in both Firefox and Chrome Web browsers? a. SQL tools b. developer tools c. scan tools d. security tools

b. developer tools

To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used? a. port analysis b. footprinting c. sandboxing d. ping sweeps

b. footprinting

What is the specific act of filtering, rejecting, or sanitizing a user's untrusted input before the application processes it? a. input injection b. input validation c. authorization d. discovery

b. input validation

Red Hat and Fedora Linux use what command to update and manage their RPM packages? a. apt-get b. yum c. get d. dir

b. yum

Which of the following is not an essential component of a wireless network? a. A portion of the RF spectrum b. Firewall c. APs d. WNICs

b. Firewall

How can new tools for hacking web applications be installed to Kali Linux? a. #include packagename b. apt-get install packagename c. apt-get purge packname d. apt-get packagename

b. apt-get install packagename

Which of the following is not a security tool that can be used for web application testing? a. Wapiti b. Burp Suite c. ActiveX d. Developer Tools

c. ActiveX

What information can be extracted with enumeration? a. Only network topology and architecture b. Usernames or groups assigned on the network and information about users' recent logon times c. All of the choices can be extracted with enumeration. d. Only resources or shares on the network

c. All of the choices can be extracted with enumeration.

What tool included with Kali Linux allows you to intercept traffic between the web browser and the server so you can inspect and manipulate requests before sending them to the server? a. Slammer b. Recon-ng c. Burp Suite d. REPL

c. Burp Suite

UNIX was first written in assembly language. However, it was soon rewritten in what programming language? a. Smalltalk b. Python c. C d. Perl

c. C

In object-oriented programming, which term refers to a structure that holds pieces of data and functions? a. Algorithm b. Script c. Class d. Member function

c. Class

A systems administrator has been asked by the vulnerability manager to harden several external facing web servers. What would an example of hardening be? a. Firewall on port 443 b. Perform a vulnerability scan c. Disable telnet d. Monitor logs

c. Disable telnet

Why is documenting computer programs essential? a. Documentation eliminates any bugs in the program. b. Documentation is only necessary if a company requests it. c. Documentation makes a program easier to modify. d. Documentation ensures code is copyrighted.

c. Documentation makes a program easier to modify.

How can confidentiality and authentication be achieved using public key cryptography? a. Hash the data with the public key. b. Only share private key. c. Encrypt the data with the private key. d. Only share public key.

c. Encrypt the data with the private key.

Which of the following best describes software that resides on a chip? a. Microware b. Middleware c. Firmware d. Testware

c. Firmware

Which of the following systems should be used for equipment monitoring and when automation is critical? a. GUI b. CAD c. SCADA d. VoIP

c. SCADA

What benefit does SNMP have? a. SNMP uses private credentials for both read-only and read-write access. b. SNMP is made specifically for personal computers. c. SNMP enables remote administration. d. SNMP is safer to use because it does not allow remote administration.

c. SNMP enables remote administration.

An attacker is attempting to compromise a network through a router. Which of the following are they least likely to perform? a. Enumerating b. Footprinting c. SQL injection d. Scanning

c. SQL injection

Driving around with hardware or software that can detect access points that haven't been secured is known as what? a. Network sniffing b. Chipping c. Wardriving d. Multiplexing

c. Wardriving

A certificate contains a unique serial number and must follow which standard that describes the creation of a certificate? a. NIST b. PKI c. X.509 d. IEEE 802

c. X.509

When hackers drive around or investigate an area with an antenna, they are usually looking for which component of a wireless network? a. router b. switch c. access point d. firewall

c. access point

In HTML, each tag has a matching closing tag that is written with which of the following characters? a. backward slash (\) b. ampersand (&) c. forward slash (/) d. semicolon (;)

c. forward slash (/)

Which of the following is a mini-program within a main program that carries out a task? a. script b. loop c. function d. branch

c. function

Which of the following IEEE projects was developed to create LAN and WAN standards? a. EIA/TIA b. 801 c. ISO d. 802

d. 802

A penetration tester is trying to authenticate a user account which contains most of the information that attackers want to access. Which of the following should they target? a. SMB controllers b. CIFS servers c. File servers d. Domain controllers

d. Domain controllers

Which of the following is usually considered the biggest security threat to an organization? a. Spyware b. Viruses c. Routers d. Employees

d. Employees

What critical component of any OS, that can be vulnerable to attacks, is used to store and manage information? a. WSUS b. NetBIOS c. SQL database d. File system

d. File system

Why is knowledge of HTML important for a security professional? a. Branching, looping, and testing can be accomplished with HTML. b. Most malicious programs are written in HTML. c. HTML is a markup language, so it is not applicable to network security. d. HTML is the basis of web development.

d. HTML is the basis of web development.

The computer names you assign to Windows systems are called which of the following? a. IIS b. AD Names c. NetDDE d. NetBIOS

d. NetBIOS

Which of the following is considered to be the most critical SQL vulnerability? a. SQL password b. Null SA hash c. SQL scanning d. Null SA password

d. Null SA password

How does port scanning help in the enumeration process? a. Enumeration allows a security tester to discover live systems on a network. The next steps are finding what resources are shared on the systems, discovering logon accounts and passwords, and gaining access to network resources through port scanning. b. Port scanning is the next logical step after enumeration. c. Enumeration is synonymous with port scanning. d. Port scanning allows a security tester to discover live systems on a network. The next steps are finding what resources are shared on the systems, discovering logon accounts and passwords, and gaining access to network resources through enumeration.

d. Port scanning allows a security tester to discover live systems on a network. The next steps are finding what resources are shared on the systems, discovering logon accounts and passwords, and gaining access to network resources through enumeration.

If a security tester intends to use enumeration within the scope of testing, what is also necessary? a. None of these are necessary when security testing b. Non-Disclosure Agreement c. Verbal Permission d. Rules of Engagement and Statement of Work

d. Rules of Engagement and Statement of Work

What best describes what a digital signature is? a. A physical key to decrypt a message that was encrypted using a private key. b. A signature made by a pen on a printed out document. c. A WEP-encrypted communication. d. The hash calculated from the message content is encrypted with a private key to ensure authentication and nonrepudiation.

d. The hash calculated from the message content is encrypted with a private key to ensure authentication and nonrepudiation.

Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device? a. middleware b. fireware c. testware d. firmware

d. firmware

Which of the following terms is the rate at which a sound wave repeats? a. standard b. channel c. amplitude d. frequency

d. frequency

What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms? a. ciphertext-only. b. chosen-ciphertext. c. chosen-plaintext. d. known-plaintext.

d. known-plaintext.

To determine what resources or shares are on a network, security testers must use footprinting and what other procedure to determine what services a host computer offers? a. ping sweeps b. sandboxing c. rookits d. port scanning

d. port scanning

How can developer tools be used by attackers? a. Developer tools allow an attacker to autofill text into a webpage. b. Developer tools allow an attacker to clear history, cookies, cache, and more. c. Developer tools allow an attacker to enter SQL commands into input fields of a website in an attempt to circumvent security and access data. d. Developer tools allow an attacker to tamper with and resend requests.

d. Developer tools allow an attacker to tamper with and resend requests.

HTML does not use branching, looping, or testing due to which of the following? a. HTML is a programming language, not a markup language. b. There is no need for branching, looping, or testing on the Internet. c. Branching, looping, and testing are able to be used in HTML with the func option. d. HTML is a markup language, not a programming language.

d. HTML is a markup language, not a programming language.

How can developer tools be accessed in Firefox or Chrome? a. Use the command apt-get install developertools. b. Download the developer tools from the OWASP webpage. c. Developer tools are specific to developers and are not accessible through Firefox or Chrome. d. These tools can be accessed through the Tools menu in Firefox and Chrome.

d. These tools can be accessed through the Tools menu in Firefox and Chrome.


Conjuntos de estudio relacionados

Conceptual framework and accounting standards

View Set

Exam 1 (COPING, METABOLISM, NUTRITION)

View Set

Chapter 9: Linear Data Structures

View Set

TestOut PC Pro A+ 220-801 and 220-802

View Set

WCU Study Review 3: Ch. 16, 18, 19, 20

View Set

Back Muscles: Origin, Insertion, Innervation, Blood Supply & Action

View Set

СПО модуль - тема "Судоустрій"

View Set

Chapter 2 SmartBook (Operation Management)

View Set

Media Ethics and Law Rutgers Kremen

View Set