Chapter 2, CNIT123-QUIZ#01, Ethical Hacking Test #1, CNIT123-Quiz#03, Ethical Hacking and Network Defense Chpt 1-3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the decimal equivalent of the binary number 11000001? 201 128 193 164

193

What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack? Application Network Transport Internet

Application

What type of testing procedure involves the tester(s) analyzing the company's security policy and procedures, and reporting any vulnerabilities to management? a. penetration test b. security test c. hacking test d. ethical hacking test

B. Security test

What IPv4 address class has the IP address 221.1.2.3? Class D Class B Class A Class C

Class C

What TCP flag is responsible for synchronizing the beginning of a session? URG flag PSH flag ACK flag SYN flag

SYN flag

What type of network attack relies on guessing a TCP header's initial sequence number, or ISN? ARP spoofing Session hijacking Man-in-the-middle DoS

Session hijacking

What connection-oriented protocol is utilized by the Transport layer? HTTPS TCP SSL UDP

TCP

What protocol is the most widely used and allows all computers on a network to communicate and functioncorrectly? TCP/IP NetBIOS IPX/SPX ATM

TCP/IP

What does the acronym TCP represent? The Control Protocol Transfer Control Protocol Transfer Congestion Protocol Transmission Control Protocol

Transmission Control Protocol

In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header? Transport Network Internet Application

Transport

Penetration testers and security testers need technical skills to perform their duties effectively. T/F

True

Wget is a *nix system command that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet. T/F

True

What TCP/IP protocol is fast, unreliable, and operates at the Transport layer? FTP POP3 TCP UDP

UDP

What security certification did the "The International Council of Electronic Commerce Consultants" (EC-Council) develop? a) (CEH) Certified Ethical Hacker b) Security + c) (CISSP) Certified Information Systems Security Professional d) (OPST) OSSTMM Professional Security Tester

a) (CEH) Certified Ethical Hacker

In the TCP/IP stack, what layer is concerned with physically moving bits across the network's medium? Transport Network Application Internet

Network

What specific term does the U.S. Department of Justice use to label all illegal access to computer or network systems? a) hacking b) packet sniffing c) cracking d) security testing

a) hacking

What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity? a. ICMP c. TCP b. UDP d. ARP

a. ICMP

What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments? a. Transport layer c. Application layer b. Internet layer d. Network layer

a. Transport layer

What penetration model should be used when a company's management team does not wish to disclose that penetration testing is being conducted? a. black box b. white box c. red box d. silent box

a. black box

What acronym represents the U.S. Department of Justice new branch that addresses computer crime? a) CEH b) CHIP c) GIAC d) OPST

b) CHIP = Computer Hacking and Intellectual Property

What subject area is not one of the 22 domains tested during the CEH exam? a) Sniffers b) Trojan hacking c) Footprinting d) Social engineering

b) Trojan hacking

What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network? a. 128 address c. 224 address b. 127 address d. 255 address

b. 127 address

What type of network attack relies on guessing a TCP header's initial sequence number, or ISN? a. ARP spoofing c. DoS b. Session hijacking d. Man-in-the-middle

b. Session hijacking

What TCP/IP protocol is fast, unreliable, and operates at the Transport layer? a. TCP c. FTP b. UDP d. POP3

b. UDP

What professional level security certification did the "International Information Systems Security Certification Consortium" (ISC2) develop? a) (CEH) Certified Ethical Hacker b) Security + c) (CISSP) Certified Information System Security Professional d) (OPST) OSSTM Professional Security Tester

c) (CISSP) Certified Information System Security Professional

What name is given to people who break into computer systems with the sole purpose to steal or destroy data?

c) crackers -- A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs, or in other ways intentionally breaches computer security. ... Some breaking-and-entering has been done ostensibly to point out weaknesses in a site's security system.

What term best describes a person who hacks computer systems for political or social reasons? a) sniffer b) cracktivist c) hacktivist d) script kiddy

c) hacktivist

What type of laws should a penetration tester or student learning hacking techniques be aware of? a) local b) state c) federal d) all of the above

d) all of the above: local, state, and federal laws

What penetration model should be used when a company's management team does not wish to disclose that penetration testing is being conducted? a) red box b) white box c) silent box d) black box

d) black box

What penetration model should a company use if they only want to allow the penetration tester(s) partial or incomplete information regarding their network system? a) white box b) black box c) red box d) gray box

d) gray box

What common term is used by security testing professionals to describe vulnerabilities in a network? a) packets b) bytes c) bots d) holes

d) holes

What type of testing procedure involves the tester(s) analyzing the company's security policy and procedures, and reporting any vulnerabilities to management? a) hacking test b) penetration test c) ethical hacking test d) security test

d) security test

What penetration model would likely provide a network diagram showing all the company's routers, switches, firewalls, and intrusion detection systems, or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems? a) blue box b) white box c) red box d) black box

d) white box

What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity? port IP SYN ISN

port

How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix? 512 16 million 254 65,000

254

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server? 434 443 408 80

443

When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack" the company's network, they should proceed by performing what precautionary step? a) consult their lawyer b) sign the contract c) begin testing immediately d) consult the company's lawyer

a) consult their lawyer

Port scanning is a noninvasive, nondestructive, and legal testing procedure that is protected by federal law. T/F

False

What common term is used by security testing professionals to describe vulnerabilities in a network? a. bytes c. bots b. packets d. holes

d. holes

What professional level security certification requires five years of experience and is designed to focus on an applicant's security-related managerial skills? a) (CISSP) Certified Information Systems Security Professional b) (CEH) Certified Ethical Hacker c) (OPST) OSSTMM Professional Security Tester d) (OSCP) Offensive Security Certified Professional

a) (CISSP) Certified Information Systems Security Professional

What organization disseminates research documents on computer and network security worldwide at no cost? a) SANS b) ISECOM c) EC-Council d) ISC2

a) SANS = SANS stands for SysAdmin, Audit, Network and Security. Created in 1989 as a cooperative research and education organization.

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server? a. 443 c. 434 b. 80 d. 408

a. 443

What penetration model should a company use if they only want to allow the penetration tester(s) partial or incomplete information regarding their network system? a. gray box c. black box b. white box d. red box

a. gray box

What policy, provide by a typical ISP, should be read and understood before performing any port scanning outside of your private network? a) ISP Security Policy b) Acceptable Use Policy c) Port Scanning Policy d) Hacking Policy

b) Acceptable Use Policy

What type of assessment performed by a penetration tester attempts to identify all the weaknesses found in an application or on a system? a) health b) vulnerability c) network d) technical

b) vulnerability

What port does the Domain Name System, or DNS service use? a. 25 c. 69 b. 53 d. 80

b. 53

In the TCP/IP stack, what layer is concerned with physically moving bits across the network's medium? a. Internet c. Transport b. Network d. Application

b. Network

What TCP flag is responsible for delivering data directly and immediately to an application? a. ACK flag c. RST flag b. PSH flag d. SYN flag

b. PSH flag

Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing? a) tasks b) kiddies c) packets d) scripts

d) scripts

What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate? a. Internet c. Transport b. Network d. Application

d. Application

What TCP flag is responsible for synchronizing the beginning of a session? a. URG flag c. PSH flag b. ACK flag d. SYN flag

d. SYN flag

What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address? Network Application Internet Transport

Internet

What name is given to people who break into computer systems with the sole purpose to steal or destroy data? a. packet monkeys c. script kiddies b. crackers d. bots

b. crackers

What term best describes a person who hacks computer systems for political or social reasons? a. cracktivist b. hacktivist c. sniffer d. script kiddy

b. hacktivist

If you work for a company as a security professional, you will most likely be placed on a special team that will conduct penetration tests. What is the standard name for a team made up of security professionals? a) security team b) pen team c) blue team d) red team

d) red team

What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack? a. Internet c. Transport b. Network d. Application

d. Application

What port does the Domain Name System, or DNS service use? 69 25 53 80

53

What 32-bit number tracks packets received by a node and allows the reassembling of large packets that have been broken up into smaller packets? UDP IP TCP ISN

ISN

What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address? a. Internet c. Transport b. Network d. Application

a. Internet

What derogatory title do experienced hackers, who are skilled computer operators, give to inexperienced hackers? a. script kiddies b. repetition monkeys c. packet sniffers d. crackers

a. script kiddies

What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network? 224 address 127 address 255 address 128 address

127 address

What port does the Trivial File Transfer Protocol, or TFTP service use? 53 25 69 80

69

What port does the Hypertext Transfer Protocol, or HTTP service use? 53 25 80 69

80

What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate? Network Transport Internet Application

Application

Network attacks can often begin by gathering information from a company's Web site. T/F

True

What specific term does the U.S. Department of Justice use to label all illegal access to computer or network systems? a. Hacking b. Cracking c. Security testing d. Packet sniffing

A. Hacking

What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity? a. ISN c. port b. IP d. SYN

c. port

What professional security certification requires applicants to demonstrate hands-on abilities to earn their certificate? a) (CISSP) Certified Information Systems Security Professional b) CompTIA Security+ c) (CEH) Certified Ethical Hacker d) (OSCP) Offensive Security Certified Professional

d) (OSCP) Offensive Security Certified Professional

What port does the Hypertext Transfer Protocol, or HTTP service use? a. 25 c. 69 b. 53 d. 80

d. 80

What subject area is not one of the 22 domains tested during the CEH exam? a. Sniffers c. Footprinting b. Social engineering d. Trojan hijacking

d. Trojan hijacking

What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity? UDP ICMP ARP TCP

ICMP

Penetration testing can create ethical, technical, and privacy concerns for a company's management team. What can a security consultant do to ensure the client fully understands the scope of testing that will be performed? a) create a virtual demonstration b) create a lab demonstration c) create a slide presentation d) create a contractual agreement

d) create a contractual agreement

What federal law makes it illegal to intercept any type of communication, regardless of how it was transmitted? a. Fraud and Abuse Act c. Electronic Communication Privacy Act b. Interception Abuse Act d. The Computer Fraud Act

c. Electronic Communication Privacy Act

What connection-oriented protocol is utilized by the Transport layer? a. HTTPS c. TCP b. UDP d. SSL

c. TCP

What security certification did the "The International Council of Electronic Commerce Consultants" (EC-Council) develop? a. Security+ b. OSSTMM Professional Security Tester (OPST) c. Certified Information Systems Security Professional (CISSP) d. Certified Ethical Hacker (CEH)

d. Certified Ethical Hacker (CEH)

What professional security certification requires applicants to demonstrate hands-on abilities to earn their certificate? a. Offensive Security Certified Professional b. Certified Ethical Hacker c. Certified Information Systems Security Professional d. CompTIA Security+

a. Offensive Security Certified Professional

Penetration testing can create ethical, technical, and privacy concerns for a company's management team. What can a security consultant do to ensure the client fully understands the scope of testing that will be performed? a. create a contractual agreement c. create a virtual demonstration b. create a lab demonstration d. create a slide presentation

a. create a contractual agreement

When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack" the company's network, they should proceed by performing what precautionary step? a. consult the company's lawyer c. sign the contract b. consult their lawyer d. begin testing immediately

b. consult their lawyer

What derogatory title do experienced hackers, who are skilled computer operators, give to inexperienced hackers? a) repetition monkeys b) packet sniffers c) script kiddies d) crackers

c) script kiddies

What port does the Trivial File Transfer Protocol, or TFTP service use? a. 25 c. 69 b. 53 d. 80

c. 69

What acronym represents the U.S. Department of Justice new branch that addresses computer crime? a. GIAC c. CHIP b. OPST d. CEH

c. CHIP

In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header? a. Internet c. Transport b. Network d. Application

c. Transport

Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing? a. kiddies b. packets c. scripts d. tasks

c. scripts

What type of assessment performed by a penetration tester attempts to identify all the weaknesses found in an application or on a system? a. health c. vulnerability b. technical d. network

c. vulnerability

What 32-bit number tracks packets received by a node and allows the reassembling of large packets that have been broken up into smaller packets? a. IP c. UDP b. TCP d. ISN

d. ISN

A DDoS attack is launched against a host from a single server or workstation. T/F

False

A hex number is written with two characters, each representing a byte. True False

False

In the TCP/IP stack, the Transport layer includes network services and client software. True False

False

In the TCP/IP stack, the Transport layer includes network services and client software. T/F

False

What federal law makes it illegal to intercept any type of communication, regardless of how it was transmitted? a) the Computer Fraud Act b) Electronic Communications Privacy Act c) Fraud & Abuse Act d) Interception Abuse Act

b) Electronic Communications Privacy Act (of 1986) -- This Electronic Communication Privacy Act (ECPA) prohibits the interception, disclosure, or use of wire, oral, or electronic communications.

What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology? a) GIAC b) OPST c) CEH d) CISSP

b) OPST = OSSTMM Professional Security Tester

An octal digit can be represented with only three bits because the largest digit in octal is seven. True False

True

Malware programs cannot be detected by antivirus programs. T/F

False

To retrieve e-mail from a mail server, you most likely access port 119. True False

False

What TCP flag is responsible for delivering data directly and immediately to an application? ACK flag PSH flag SYN flag RST flag

PSH flag

What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments? Transport layer Application layer Internet layer Network layer

Transport layer

Malware is malicious software, such as a virus, worm, or Trojan program, introduced into a network. T/F

True

What port does the Simple Mail Transfer Protocol, or SMTP service use? 53 25 80 69

25

No matter what medium connects computers on network-copper wires, fiber-optic cables, or a wireless setup; the same protocol must be running on all computers if communication is going to function correctly. True False

True

No matter what medium connects computers on network-copper wires, fiber-optic cables, or a wireless setup; the same protocol must be running on all computers if communication is going to function correctly. T/F

True


Kaugnay na mga set ng pag-aaral

Frederick Douglass Style Analysis

View Set

a&p ch 21: processes of respiration

View Set

Chapter 12: Cardiovascular Alterations

View Set