Ethical hacking first assignment

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In the Perl programming language, comment lines begin with the which of the following character(s)?

#

In a Linux script, which of the lines is important because it identifies the file as a script?

#!/bin/sh

What port does the Domain Name System, or DNS service use?

53

For a Windows computer to be able to access a *nix resource, which of the following must be enabled on both systems?

CIFS

Which Windows 10 feature uses virtualization to protect access tokens from theft by attackers?

Credential Guard

In the TCP/IP stack, the Transport layer includes network services and client software

False

What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android, Windows Mobile, and the Apple iPhone OS?

Java-based

Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?

NetBIOS

What does the "NBT" part of "NBTscan" stand for?

NetBIOS over TCP/IP

If an organization does not want to rely on a wireless device to authenticate users, which of the following is a secure alternative?

RADIUS server

Closed ports respond to a NULL scan with what type of packet?

RST

Which of the following application tests analyzes an application's source code for vulnerabilities, and is therefore only possible when the source code of an application is available?

Static Application Security Testing

When hackers drive around or investigate an area with an antenna, they are usually looking for which component of a wireless network?

access point

The virus signature file is maintained by what type of software?

antivirus

What type of firewall inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection firewall does?

application-aware firewall

When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?

buffer overflow

To check whether a CGI program works, you can test the URL in your Web browser. Which of the following directories should you save the program to on your Web server before you check the URL in your Web browser?

cgi-bin

Which of the following is a mini-program within a main program that carries out a task?

function

What device is designed specifically to reduce broadcast traffic that passes over a network and to choose the best path for moving those packets?

router

Which utility can extract meta-data and documents on a Website to reveal the document creator's network login, e-mail address, IP address, and other important information?

FOCA

What specific term does the U.S. Department of Justice use to label all illegal access to computer or network systems?

Hacking

What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters?

brute force

Which of the following can be a small program developed specifically for use with embedded systems, or a stripped-down version of an OS commonly used on general-purpose computers?

embedded OS

Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?

shoulder surfing

What type of cryptography is demonstrated by reversing the alphabet so A becomes Z, B becomes Y, and so on?

substitution cipher


Kaugnay na mga set ng pag-aaral

Advanced Cell Biology Chapter 2 Oxford Insight

View Set

Biology Chapter 17 Key Questions

View Set

ACCT 3130 Final Exam Quiz Questions Review

View Set

Chapter 9 Health Promotion of the Infant and Family

View Set

Cellular & Molecular Basis of Medicine, Exam 4

View Set

UGA Poultry Processing-Cut Up and Deboning and Marination

View Set

module - 2 Atherosclerosis & Hyperlipidemia

View Set

Chapter 25: Fluid, Electrolyte, and Acid-Base Balance (A & P)

View Set