Ethical hacking first assignment
In the Perl programming language, comment lines begin with the which of the following character(s)?
#
In a Linux script, which of the lines is important because it identifies the file as a script?
#!/bin/sh
What port does the Domain Name System, or DNS service use?
53
For a Windows computer to be able to access a *nix resource, which of the following must be enabled on both systems?
CIFS
Which Windows 10 feature uses virtualization to protect access tokens from theft by attackers?
Credential Guard
In the TCP/IP stack, the Transport layer includes network services and client software
False
What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android, Windows Mobile, and the Apple iPhone OS?
Java-based
Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?
NetBIOS
What does the "NBT" part of "NBTscan" stand for?
NetBIOS over TCP/IP
If an organization does not want to rely on a wireless device to authenticate users, which of the following is a secure alternative?
RADIUS server
Closed ports respond to a NULL scan with what type of packet?
RST
Which of the following application tests analyzes an application's source code for vulnerabilities, and is therefore only possible when the source code of an application is available?
Static Application Security Testing
When hackers drive around or investigate an area with an antenna, they are usually looking for which component of a wireless network?
access point
The virus signature file is maintained by what type of software?
antivirus
What type of firewall inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection firewall does?
application-aware firewall
When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?
buffer overflow
To check whether a CGI program works, you can test the URL in your Web browser. Which of the following directories should you save the program to on your Web server before you check the URL in your Web browser?
cgi-bin
Which of the following is a mini-program within a main program that carries out a task?
function
What device is designed specifically to reduce broadcast traffic that passes over a network and to choose the best path for moving those packets?
router
Which utility can extract meta-data and documents on a Website to reveal the document creator's network login, e-mail address, IP address, and other important information?
FOCA
What specific term does the U.S. Department of Justice use to label all illegal access to computer or network systems?
Hacking
What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters?
brute force
Which of the following can be a small program developed specifically for use with embedded systems, or a stripped-down version of an OS commonly used on general-purpose computers?
embedded OS
Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?
shoulder surfing
What type of cryptography is demonstrated by reversing the alphabet so A becomes Z, B becomes Y, and so on?
substitution cipher