Ethical hacking final lol
What is the difference between a public key and a private key? a. A private key is a secret key known only by the key owner. b. A public key is openly available. c. They are the same. d. They are symmetric.
a. A private key is a secret key known only by the key owner.
Which of the following can be used as a countermeasure for wireless attacks? a. Assign static IP addresses to wireless clients. b. Use wardriving software. c. Enable SSID broadcasts. d. Enable WPS.
a. Assign static IP addresses to wireless clients.
Which language is not considered an object-oriented programming language? a. C b. Perl c. Object COBOL d. Java
a. C
Which of the following is not a best practice in regards to password policies? a. Common words b. Rotation c. Complexity d. Minimum length
a. Common words
A security professional at a large corporation needs to transmit legal documentation over the internet. The professional does not want this sensitive data readily viewable if intercepted. What should the professional implement? a. Encryption Algorithm. b. Plaintext. c. Cleartext. d. Roman Cipher.
a. Encryption Algorithm.
Wapiti uses fuzzing. What is fuzzing? a. Fuzzing is an attempt to inject data into whatever will accept it. b. Fuzzing is the process of inspecting code. c. Fuzzing is a mixture of a black box approach and a white box approach to testing. d. Fuzzing is the detection of common forms that allow uploads of command injection.
a. Fuzzing is an attempt to inject data into whatever will accept it.
WiFI Pineapple has been called "a Swiss-army knife for wireless hacking" for its many features. Which of the following is not a task that WiFi Pineapple can accomplish? a. Include the add-on GUI front-end called Fern WIFI Cracker. b. Allow an attacker to emulate any network that a client requests. c. Set up fake APs to social-engineer users or confuse attackers using airbase-ng. d. Perform scans for wireless access points.
a. Include the add-on GUI front-end called Fern WIFI Cracker.
What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android, Windows Mobile, and the Apple iPhone OS? a. Java b. Python c. Perl d. C++
a. Java
Which of the following defines how data is placed on a carrier signal? a. Modulation b. Multiplexing c. Supplication d. Wardriving
a. Modulation
What is the most common motivator behind today's cyber security attacks? a. Money b. Jobs c. Curiosity d. Notoriety
a. Money
A Linux administrator wants to share files between Windows and Linux servers. What protocol should they use? a. Samba b. SMBv3 c. NetBIOS d. CIFS
a. Samba
Which of the following is not a best practice for protecting embedded OS's? a. Scan b. Inventory c. Encryption d. Least Privilege
a. Scan
What type of cryptography is demonstrated by reversing the alphabet, so A becomes Z, B becomes Y, and so on? a. Substitution cipher. b. Diffie Helman cipher. c. Complete cipher. d. Roman cipher
a. Substitution cipher.
What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters? a. brute force. b. dictionary. c. replay. d. ciphertext-only.
a. brute force.
What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS systems? a. null session b. exit session c. null system d. net session
a. null session
Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources? a. router b. host c. rootkit d. driver
a. router
Wireless technology is part of daily life. Which of the following is not an example of wireless technology? a. Fiber-optic communications b. Smart cars c. Garage door openers d. Baby monitors
a. Fiber-optic communications
Which type of XSS vulnerability is especially harmful? a. Stored because it can be delivered to subsequent users of the application. b. Reflected because it results from a server accepting untrusted, unvalidated input. c. Stored because it relies on social engineering to trick a user into visiting a maliciously crafted link or URL. d. Reflected because the attacker's goal is to execute code on a remote user's computer.
a. Stored because it can be delivered to subsequent users of the application.
A systems administrator is trying to harden an externally facing DNS server and wants to disable every port except for DNS. Which port should they leave open? a. 3389 TCP b. 53 UDP c. 445 TCP d. 1025-1039 TCP/UDP
b. 53 UDP
What benefit does object-oriented programming offer? a. Modularity b. All are benefits of object-oriented programming c. Inheritance d. Scalability
b. All are benefits of object-oriented programming
Why should security professionals have at least a little knowledge about the Apache Web Server? a. Apache is simple and quick to learn. b. Apache Web Server is said to run more Web servers than IIS. c. Apache is rare and expensive. d. Apache knowledge easily translates from one OS to another due to its singular layout.
b. Apache Web Server is said to run more Web servers than IIS.
Which type of algorithm uses two keys that are mathematically related? a. Enigma b. Asymmetric. c. Symmetric. d. Roman
b. Asymmetric.
Which malware targeted medical systems due to the problems with patching? a. QNX b. Conficker c. psyb0t d. Y2K
b. Conficker
Which of the following is the most intrusive? a. Enumeration Passive reconnaissance b. Enumeration c. Footprinting d. Port scanning
b. Enumeration
Third-party media players on webpages were often problematic and proved to be security risks, but are no longer needed due to which version of HTML? a. HTML 4.01 b. HTML5 c. HTML 2.0 d. HTML 3.2
b. HTML5
What does the "NBT" part of "NBTscan" stand for? a. NetBIOS over Transport b. NetBIOS over TCP/IP c. NetBIOS Test d. NetBIOS Transfer
b. NetBIOS over TCP/IP
Which of the following operating systems is considered the most secure? a. Windows b. None of these are more secure than the others c. Android d. Linux
b. None of these are more secure than the others
What is a logical goal for security professionals? a. Use foolproof countermeasures to protect the network and prevent attacks. b. Protect a network and make it difficult for attackers to break into it. c. Completely prevent attackers from breaking into a network. d. All of these are logical goals for security professionals.
b. Protect a network and make it difficult for attackers to break into it.
What kind of encryption can PGP use? a. Purple. b. RSA. c. Bombe. d. S/MIME.
b. RSA.
Which of the following Windows utilities includes a suite of tools to help administrators deploy and manage servers and even allows for administrators to control mobile devices running Android, iOS, and Windows Mobile OS? a. AUS b. SCCM c. WSUS d. SMS
b. SCCM
What type of useful tools can a security tester find available in both Firefox and Chrome Web browsers? a. SQL tools b. developer tools c. scan tools d. security tools
b. developer tools
To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used? a. port analysis b. footprinting c. sandboxing d. ping sweeps
b. footprinting
What is the specific act of filtering, rejecting, or sanitizing a user's untrusted input before the application processes it? a. input injection b. input validation c. authorization d. discovery
b. input validation
Red Hat and Fedora Linux use what command to update and manage their RPM packages? a. apt-get b. yum c. get d. dir
b. yum
Which of the following is not an essential component of a wireless network? a. A portion of the RF spectrum b. Firewall c. APs d. WNICs
b. Firewall
How can new tools for hacking web applications be installed to Kali Linux? a. #include packagename b. apt-get install packagename c. apt-get purge packname d. apt-get packagename
b. apt-get install packagename
Which of the following is not a security tool that can be used for web application testing? a. Wapiti b. Burp Suite c. ActiveX d. Developer Tools
c. ActiveX
What information can be extracted with enumeration? a. Only network topology and architecture b. Usernames or groups assigned on the network and information about users' recent logon times c. All of the choices can be extracted with enumeration. d. Only resources or shares on the network
c. All of the choices can be extracted with enumeration.
What tool included with Kali Linux allows you to intercept traffic between the web browser and the server so you can inspect and manipulate requests before sending them to the server? a. Slammer b. Recon-ng c. Burp Suite d. REPL
c. Burp Suite
UNIX was first written in assembly language. However, it was soon rewritten in what programming language? a. Smalltalk b. Python c. C d. Perl
c. C
In object-oriented programming, which term refers to a structure that holds pieces of data and functions? a. Algorithm b. Script c. Class d. Member function
c. Class
A systems administrator has been asked by the vulnerability manager to harden several external facing web servers. What would an example of hardening be? a. Firewall on port 443 b. Perform a vulnerability scan c. Disable telnet d. Monitor logs
c. Disable telnet
Why is documenting computer programs essential? a. Documentation eliminates any bugs in the program. b. Documentation is only necessary if a company requests it. c. Documentation makes a program easier to modify. d. Documentation ensures code is copyrighted.
c. Documentation makes a program easier to modify.
How can confidentiality and authentication be achieved using public key cryptography? a. Hash the data with the public key. b. Only share private key. c. Encrypt the data with the private key. d. Only share public key.
c. Encrypt the data with the private key.
Which of the following best describes software that resides on a chip? a. Microware b. Middleware c. Firmware d. Testware
c. Firmware
Which of the following systems should be used for equipment monitoring and when automation is critical? a. GUI b. CAD c. SCADA d. VoIP
c. SCADA
What benefit does SNMP have? a. SNMP uses private credentials for both read-only and read-write access. b. SNMP is made specifically for personal computers. c. SNMP enables remote administration. d. SNMP is safer to use because it does not allow remote administration.
c. SNMP enables remote administration.
An attacker is attempting to compromise a network through a router. Which of the following are they least likely to perform? a. Enumerating b. Footprinting c. SQL injection d. Scanning
c. SQL injection
Driving around with hardware or software that can detect access points that haven't been secured is known as what? a. Network sniffing b. Chipping c. Wardriving d. Multiplexing
c. Wardriving
A certificate contains a unique serial number and must follow which standard that describes the creation of a certificate? a. NIST b. PKI c. X.509 d. IEEE 802
c. X.509
When hackers drive around or investigate an area with an antenna, they are usually looking for which component of a wireless network? a. router b. switch c. access point d. firewall
c. access point
In HTML, each tag has a matching closing tag that is written with which of the following characters? a. backward slash (\) b. ampersand (&) c. forward slash (/) d. semicolon (;)
c. forward slash (/)
Which of the following is a mini-program within a main program that carries out a task? a. script b. loop c. function d. branch
c. function
Which of the following IEEE projects was developed to create LAN and WAN standards? a. EIA/TIA b. 801 c. ISO d. 802
d. 802
A penetration tester is trying to authenticate a user account which contains most of the information that attackers want to access. Which of the following should they target? a. SMB controllers b. CIFS servers c. File servers d. Domain controllers
d. Domain controllers
Which of the following is usually considered the biggest security threat to an organization? a. Spyware b. Viruses c. Routers d. Employees
d. Employees
What critical component of any OS, that can be vulnerable to attacks, is used to store and manage information? a. WSUS b. NetBIOS c. SQL database d. File system
d. File system
Why is knowledge of HTML important for a security professional? a. Branching, looping, and testing can be accomplished with HTML. b. Most malicious programs are written in HTML. c. HTML is a markup language, so it is not applicable to network security. d. HTML is the basis of web development.
d. HTML is the basis of web development.
The computer names you assign to Windows systems are called which of the following? a. IIS b. AD Names c. NetDDE d. NetBIOS
d. NetBIOS
Which of the following is considered to be the most critical SQL vulnerability? a. SQL password b. Null SA hash c. SQL scanning d. Null SA password
d. Null SA password
How does port scanning help in the enumeration process? a. Enumeration allows a security tester to discover live systems on a network. The next steps are finding what resources are shared on the systems, discovering logon accounts and passwords, and gaining access to network resources through port scanning. b. Port scanning is the next logical step after enumeration. c. Enumeration is synonymous with port scanning. d. Port scanning allows a security tester to discover live systems on a network. The next steps are finding what resources are shared on the systems, discovering logon accounts and passwords, and gaining access to network resources through enumeration.
d. Port scanning allows a security tester to discover live systems on a network. The next steps are finding what resources are shared on the systems, discovering logon accounts and passwords, and gaining access to network resources through enumeration.
If a security tester intends to use enumeration within the scope of testing, what is also necessary? a. None of these are necessary when security testing b. Non-Disclosure Agreement c. Verbal Permission d. Rules of Engagement and Statement of Work
d. Rules of Engagement and Statement of Work
What best describes what a digital signature is? a. A physical key to decrypt a message that was encrypted using a private key. b. A signature made by a pen on a printed out document. c. A WEP-encrypted communication. d. The hash calculated from the message content is encrypted with a private key to ensure authentication and nonrepudiation.
d. The hash calculated from the message content is encrypted with a private key to ensure authentication and nonrepudiation.
Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device? a. middleware b. fireware c. testware d. firmware
d. firmware
Which of the following terms is the rate at which a sound wave repeats? a. standard b. channel c. amplitude d. frequency
d. frequency
What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms? a. ciphertext-only. b. chosen-ciphertext. c. chosen-plaintext. d. known-plaintext.
d. known-plaintext.
To determine what resources or shares are on a network, security testers must use footprinting and what other procedure to determine what services a host computer offers? a. ping sweeps b. sandboxing c. rookits d. port scanning
d. port scanning
How can developer tools be used by attackers? a. Developer tools allow an attacker to autofill text into a webpage. b. Developer tools allow an attacker to clear history, cookies, cache, and more. c. Developer tools allow an attacker to enter SQL commands into input fields of a website in an attempt to circumvent security and access data. d. Developer tools allow an attacker to tamper with and resend requests.
d. Developer tools allow an attacker to tamper with and resend requests.
HTML does not use branching, looping, or testing due to which of the following? a. HTML is a programming language, not a markup language. b. There is no need for branching, looping, or testing on the Internet. c. Branching, looping, and testing are able to be used in HTML with the func option. d. HTML is a markup language, not a programming language.
d. HTML is a markup language, not a programming language.
How can developer tools be accessed in Firefox or Chrome? a. Use the command apt-get install developertools. b. Download the developer tools from the OWASP webpage. c. Developer tools are specific to developers and are not accessible through Firefox or Chrome. d. These tools can be accessed through the Tools menu in Firefox and Chrome.
d. These tools can be accessed through the Tools menu in Firefox and Chrome.