ITM 480 Mid term

¡Supera tus tareas y exámenes ahora con Quizwiz!

What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?

127 address

Approximately how many IP addresses are allowed under IPv4?

4.3 billion

An individual wants to switch from using Hypertext Transfer Protocol (HTTP) to a more secure protocol. To which port are they most likely to switch?

443

What port does the Domain Name System, or DNS service use?

53

What policy, provided by a typical ISP, should be read and understood before performing any port scanning outside of your private network?

Acceptable Use Policy

What type of footprinting might trigger a network alert?

Active footprinting because you are actually prodding the network in ways that might seem suspicious.

Which of the following is a method of educating network users to minimize the damage and the frequency with which computers become infected?

All of the answer choices are methods of educating users to minimize the damage and the frequency with which computers become infected.

Why is a simple process like "dumpster diving" so effective when gathering information utilizing social engineering?

All of the choices are reasons why dumpster diving can be effective.

With which type of laws should a penetration tester or student learning hacking techniques be familiar?

All of them (federal, state, & local)

In terms of network security, the acronym IDS stands for which of the following?

Intrusion Detection System

What type of physical security device can be used by both security professionals and attackers?

Keyloggers

Protecting an organization from malware attacks is difficult because new viruses, worms, and Trojans appear daily. What can mitigate some of these risks by detecting many malware programs?

antivirus software

What penetration model should be used when a company's management team does not wish to disclose that penetration testing is being conducted?

black box

Which of the following is not a type of social engineering?

Honeypotting

What advantage does subnetting offer?

Increased security

What skills does a security professional need to be successful?

Both knowledge of network and computer technology and the ability to communicate with management and IT personnel.

In Unix and Linux systems, what command allows you to alter the permissions of files and directories?

Chmod

Which class of IP addresses are reserved for multicast and experimental addressing?

Class D and Class E

Which of the following is not an example of social engineering?

Training: Requiring employees to attend annual security training.

What does the acronym TCP represent?

Transmission Control Protocol

Which of the following activities is not illegal?

Discovering passwords of company personnel when testing for vulnerabilities

What term refers to a person who performs most of the same activities a hacker does, but with the owner or company's permission?

Ethical Hacker

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

Network security

Almost all of the tools available for footprinting are free and open source. What name is used to refer to these tools?

Open Source Intelligence (OSINT) tools

What type of attack causes the victim's computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?

Ping of Death

What port number is IMAP

Port 143

What port does SSH use?

Port 22

What port does Telnet use?

Port 23

What port does HTTP use?

Port 80

Footprinting is also known by what term?

Reconnaissance

Which of the following program files would most likely not be included in a whitelist?

Unknown.exe

Which of the following is an automated way to discover pages of a website by following links?

Spidering

What protocol is the most widely used and allows all computers on a network to communicate and function correctly?

TCP/IP

What is the function of the Domain Name System?

The DNS server resolves the name of a URL to an IP address.

The most insidious attacks against networks and computers worldwide take place via Trojan programs. Why do Trojan attacks continue to occur?

Users simply click Allow when warned about suspicious activity on a port.

Which of the following is a possibility when you work as a security professional?

Violating federal laws, Being sued for slowing down a company's network, Causing a DoS attack inadvertently

Communication between two devices is not properly functioning. What is the most likely cause of the communication issues?

The protocols on each device differ.

Why might companies prefer black box testing over white box testing?

The white box model puts the burden on the tester to find information about the technologies a company is using.

What penetration model would likely provide a network diagram showing all the company's routers, switches, firewalls, and intrusion detection systems, or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?

White box

Which utility is used to gather IP and domain information?

Whois

An attacker manipulates messages between two parties in order to have one party send money to the attacker's account instead of the other party's account. What type of attack is occurring?

man-in-the-middle

Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?

shoulder surfing

When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?

spear phishing

What line of defense allows only approved programs to run on a computer?

whitelisting


Conjuntos de estudio relacionados

Teaching techniques/learning stratageis

View Set

Retinoblastoma, Wilm's tumor, Neuroblastoma

View Set

Fundamentals Medication Administration Review

View Set

biceps, triceps, and coracobrachialis. quiz

View Set

Texas Promulgated Contract Forms Chapter 2

View Set