Ethical Hacking Midterm

¡Supera tus tareas y exámenes ahora con Quizwiz!

Please list at least five kinds of Malware

1. Virus 2. Worm 3. Trojan Program 4. Spyware 5. Adware

The POP3 service uses port ____.

110

The Microsoft RPC service uses port ____.

135

____ sometimes displays a banner that notifies the user of its presence.

Adware

In the TCP/IP stack, the ____ layer is where applications and protocols, such as HTTP and Telnet, operate.

Application

The ____-layer protocols are the front ends to the lower-layer protocols in the TCP/IP stack.

Application

what is Buffer Overflow Attacks

Buffer Overflow Attack results from vulnerability in poorly written code, it is an application attack where an attacker writes code that overflows the buffer causing an application to crash.

The International Council of Electronic Commerce Consultants (EC-Council) has developed a certification designation called ____.

Certified Ethical Hacker (CEH)

What type of class has the IP address 193.1.2.3?

Class C

____ is a tool that is used to perform DNS zone transfers.

Dig

A ____ attack prevents legitimate users from accessing network resources.

DoS

____ can be used to gather information useful for computer criminals, like company phone directories, financial reports, interoffice memos, resumes of employees, etc.

Dumpster diving

In the TCP/IP stack, the ____ layer uses IP addresses to route packets.

Internet

____ is a tool that is used to read and write data to ports over a network.

Netcat

In the TCP/IP stack, the ____ layer is concerned with physically moving electrons across a medium.

Network

____ is concerned with the security of computers or devices that are part of a network infrastructure.

Network security

The ____ certification uses the Open Source Security Testing Methodology Manual (OSSTMM), written by Peter Herzog, as its standardized methodology.

OPST

The ____ tool can generate a report that can show an attacker how a Web site is structured and lists Web pages that can be investigated for further information.

Paros

____ is trailing closely behind an employee who has access to an area without the person realizing that you didn't use a PIN or a security badge to enter the area.

Piggybacking

In the ____ attack, the attacker simply creates an ICMP packet that's larger than the maximum allowed 65,535 bytes.

Ping of Death

PKI stands for ____.

Public Key Infrastructure

"____" is not a domain tested for the CEH exam.

Red team testing

The ____ Institute Top 20 list details the most common network exploits and suggests ways of correcting vulnerabilities.

SANS

____ is a Web tool used to gather IP and domain information. It is available for both UNIX and Window OSs.

SamSpade

What is Script kiddies or packet monkeys

Script kiddies or packet monkeys are younger inexperienced hackers who copy code from knowledgeable hackers

TCP stands for ____.

Transmission Control Protocol

UDP stands for ____.

User Datagram Protocol

____ is a tool that is used to gather IP and domain information.

Whois

In the ____ model, management does not divulge to staff that penetration testing is being conducted, nor does it give the tester any diagrams or describe what technologies the company is using.

black box

In a ____ attack, a programmer finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.

buffer overflow

Which of the following provides the most secure method of securing a company's assets?

card access

Some of the most infamous cases are hacks carried out by ____ students, such as the eBay hack of 1999.

college

Based on the starting decimal number of the ____ byte, you can classify IP addresses as Class A, Class B, or Class C.

first

An April 2009 article in USA Today revealed that the federal government is looking for ____ to pay them to secure the nation's networks.

hackers

The binary number 11000001 converted to decimal is ____.

193

Currently, the CEH exam is based on ____ domains (subject areas) with which the tester must be familiar.

22

The SMTP service uses port ____.

25

Each Class C IP address supports up to ____ host computers.

254

The DNS service uses port ____.

53

The TFTP service uses port ____.

69

The HTTP service uses port ____.

80

Please list and explain the three main penetration testing methodologies

1. Whitebox model - tester is told about network topology and technology 2. Blackbox model - tester is not given details about network topology and technology 3. Greybox model - a hybrid between whitebox and blackbox model, the tester is given partial information

The Network News Transport Protocol service uses port ____.

119

The NetBIOS service uses port ____.

139

What is Denial-of-Service Attacks

Denial of Service attack prevents legitimate users from accessing network resources while not attempting to truthfully access information.

Please explain what Ethical hacker, penetration test and security test are

Ethical hackers are hired by companies to perform penetration tests. Penetrations tests are an attempt to break into a companies network to find the weakest link. Security tests analyze a company's security policy and procedures and report the vulnerabilities.

IDS stands for ____.

Intrusion Detection System

____ are devices or computer programs that can be used to capture keystrokes on a computer.

Keyloggers

____ commands that open and close files can be used in destructive ways.

Macro

The ____ certification is designated by the Institute for Security and Open Methodologies (ISECOM), a nonprofit organization that provides security training and certification programs for security professionals.

OSSTMM Professional Security Tester (OPST)

The collection of tools for conducting vulnerability assessments and attacks is sometimes referred to as a "____".

tiger box

A ____ can replicate itself, usually through an executable program attached to an e-mail.

virus

In the ____ model, the company might print a network diagram showing all the company's routers, switches, firewalls, and intrusion detection systems (IDSs) or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems.

white box

A ____ is a computer program that replicates and propagates itself without having to attach itself to a host.

worm

What is Ping of Death Attacks and how they work

Ping of Death Attack occurs when an attacker creates a large ICMP packet and floods the server or workstation. The large packets are fragmented into small packets and sent repeadetly, the destination point cannot handle all of the requests and becomes unavailable.

The two most popular spyware and adware removal programs are ____ and Ad-Aware.

SpyBot

____ is a remote control program.

Symantec pcAnywhere

The ____ disseminates research documents on computer and network security worldwide at no cost.

SysAdmin,Audit,Network, Security (SANS) Institute

The most widely used is protocol is ____.

TCP/IP

Describe the TCP/IP protocol stack

The TCP/IP protocol stack has four layers: Application, Transport, Internet, and Network. The Application layer houses the HTTP, FTP, SMTP, SNMP, and Telnet protocols. The Transport layer houses the TCP and UDP protocols. The Internet layer houses the IP, ICMP, and IGMP protocols. The Network layer houses the Data Link and Physical layers of the OSI model as they represent the physical network and data transfer. The TCP/IP protocol is the most widely used protocol.

____ takes penetration testing to a higher level.

Security testing

____ enables an attacker to join a TCP session and make both parties think he or she is the other party.

Session hijacking

____ can be used to read PINs entered at ATMs or to detect long-distance authorization codes that callers dial.

Shoulder surfing

Please explain what social engineering is. Please list the five main technique of social engineering. Please explain these technique with examples

Social Engineering is targeted toward human components of the network and has the goal of obtaining confidential user information. Methods of social engineering include shoulder surfing(watching someone enter their password), dumpster diving(attackers find information in victims trash), piggybacking(someone trails a user through a key card door or somewhere they aren't cleared to be), and phishing(tricking a user into giving up confidential information).

____ means using a knowledge of human nature to get information from people.

Social engineering

The U.S. Department of Justice labels all illegal access to computer or network systems as "____".

hacking

Penetration testers and security testers usually have a laptop computer configured with ____ and hacking tools.

multiple OSs

A(n) ____ is the logical, not physical, component of a TCP connection.

port

A ____ is created after an attack and usually hides itself within the OS tools, so it's almost impossible to detect.

rootkit

Trojan Programs can install a backdoor or ____ on a computer.

rootkit

Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as ____.

script kiddies

Many experienced penetration testers can write computer programs or ____ in Perl or the C language to carry out network attacks.

scripts

In a(n) ____, the tester does more than attempt to break in; he or she also analyzes the company's security policy and procedures and reports any vulnerabilities to management.

security test

To help prevent ____ attacks, you must educate your users not to type logon names and passwords when someone is standing directly behind them—or even standing nearby.

shoulder-surfing

To represent 0 to 63 characters you need only ____ bits.

six

The ____ certification for security professionals is issued by the International Information Systems Security Certifications Consortium (ISC2).

Certified Information Systems Security Professional (CISSP)

Please explain what is footprinting and list at least four method of footprinting method for information gathering.

Footprinting involves finding information on a companies network, it is passive and nonintrusive. Methods of footprinting include web site searching, and email, URL, and cookie researching.

The SysAdmin,Audit,Network, Security (SANS) Institute offers training and IT security certifications through ____.

Global Information Assurance Certification (GIAC)

In the TCP/IP stack, the ____ layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header.

Transport

One of the most insidious attacks against networks and home computers worldwide is ____, which disguise themselves as useful computer programs or applications.

Trojan programs

Software keyloggers behave like ____ and are loaded on a computer.

Trojan programs

The virus signature file is maintained by ____ software.

antivirus

A ____ can be created that welcomes new users joining a chat session, even though a person isn't actually present to welcome them.

bot


Conjuntos de estudio relacionados

Chapter 16 Immunizations/Communicable Diseases

View Set

Ch. 10 Assessment of Intelligence and General Ability

View Set

Chapter 4 Intro to Project Management, Project Management 1-7

View Set

AP Human Geography Princeton Review Vocabulary

View Set

Lifespan Developmental Psychology

View Set

Chapter 20: Population and Urbanization, Chapter 22: Social Change and the Environment

View Set

HHA, chp 24, ASSESSING MUSCULOSKELETAL SYSTEM

View Set

Vocabulary Rows of ア・カ・サ・タ・ガ・ザ・ダ

View Set

Ap world history : Modern Learning objectives

View Set