SIber english

¡Supera tus tareas y exámenes ahora con Quizwiz!

How is IP address spoofing detected?

IP address spoofing is detectable by comparing TTL values of the actual and spoofed IP addresses

Keyloggers are a form of

Keyloggers are a form of hardware or software spyware installed between the keyboard and operating system.

Attempting to gain access to a network using an employee's credentials is called the _____________ mode of ethical hacking.

Local networking uses an employee's credentials, or access rights, to gain access to the network. Physical entry uses credentials to gain access to the physical IT infrastructure.

What type of attack uses a fraudulent server with a relay address?

MITM (Man in the Middle) attacks create a server with a relay address. It is used in SMB relay attacks.

Which of the following is also known as Malicious software?

Malware

What are the elements of cybersecurity?

Network security Operational security Application security

Which of the followings are the types of scanning?

Network, vulnerability, and port

What are the port states determined by Nmap?

Open, filtered, unfiltered

Sniffing is used to perform ______________ fingerprinting.

Passive stack fingerprinting uses sniffing technologies instead of scanning.

What are the common cyber-attacks which can be used by hackers to damage network?

Phishing & Password attacks Malware & Malvertising DDoS & Drive-by downloads

Phishing is a form of ____________________.

Phishing is typically a potential attacker posing, or impersonating, a financial institution

Which of the following is not an example of physical data leakage?

Phising

What type of symmetric key algorithm using a streaming cipher to encrypt information?

RC4 uses streaming ciphers

What tool can be used to perform SNMP enumeration

SNMPUtil and IP Network Browser is SNMP enumeration tool

What is the sequence of a TCP connection

SYN-SYN ACK-ACK. A three-handed connection of TCP will start with a SYN packet followed by a SYN-ACK packet. A final ACK packet will complete the connection.

Which form of encryption does WPA use?

TKIP is used by WPA

Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?

The Cyber Security Enhancement Act 2002 deals with life sentences for hackers who recklessly endanger the lives of others, specifically transportation systems.

What are the types of scanning?

The three types of accepted scans are port, network, and vulnerability.

What are some of the most common vulnerabilities that exist in a network or system?

Additional unused features on commercial software packages. Linux is an open source code and considered to have greater security than the commercial Windows environment. Balancing security. Ease of use and functionality can open vulnerabilities that already exist. Manufacturer settings, or default settings, may provide basic protection against hacking threats, but need to change to provide advance support. The unused features of application code provide an excellent opportunity to attack and cover the attack.

Which of the following tool is used for Wi-Fi hacking?

Aircrack-ng

What are hybrid attacks?

An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols. Hybrid attacks do crack passwords that are created with replaced characters of dictionary type words

The first phase of hacking an IT system is compromise of which foundation of security?

Confidentiality

Which of the following is the most important activity in system hacking?

Cracking Password

What is the unauthorized movement of data?

Data exfiltration

What is the purpose of a Denial of Service attack?

DoS attacks force systems to stop responding by overloading the processing of the system.

Enumeration is part of what phase of ethical hacking?

Enumeration is a process of gaining access to the network by obtaining information on a user or system to be used during an attack

What is the best statement for taking advantage of a weakness in the security of an IT system?

Exploit. A weakness in security is exploited. An attack does the exploitation. A weakness is vulnerability. A threat is a potential vulnerability.

We should turn on .....to protect Our Computer from hacker.

Firewall

Which phase of hacking performs actual attack on a network or system?

Gaining Access

Why would HTTP Tunneling be used?

HTTP Tunneling is used to bypass the IDS and firewalls present on a network

Services running on a system are determined by _____________.

Hackers can identify services running on a system by the open ports that are found.

Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________.

Hacktivism is the act of malicious hacking for a cause or purpose.

Why would a hacker use a proxy server?

To hide malicious activity on the network

Why would a ping sweep be used?

To identify live systems

What does TCP/ IP stands for?

Transmission control protocol / Internet protocol

Which of the following wireless protocol uses TKIP?

WPA

Having individuals provide personal information to obtain a free offer provided through the Internet is considered what type of social engineering?

Whether using email, a fake website, or popup to entice the used, obtaining information from an individual over the Internet is a computer-based type of social engineering

Which database is queried by Whois?

Who utilizes the Internet Corporation for Assigned Names and Numbers.

What port does Telnet use?

23


Conjuntos de estudio relacionados

Test 1 (ch. 1) Practice Questions

View Set

Corporate finance chapter 9 questions

View Set

Chapter 44: Nursing Management: Patients With Oncologic Disorders of the Brain and Spinal Cord

View Set

Chapter 17 Quiz 1 (antibiotics/antibacterial)

View Set

Chapter 22: Assessment: Integumentary System

View Set

Chapter 14 The Brain and Cranial Nerves (AK)

View Set

PrepU Chp 28: Assessment of Hematologic Function and Treatment Modalities

View Set