SIber english
How is IP address spoofing detected?
IP address spoofing is detectable by comparing TTL values of the actual and spoofed IP addresses
Keyloggers are a form of
Keyloggers are a form of hardware or software spyware installed between the keyboard and operating system.
Attempting to gain access to a network using an employee's credentials is called the _____________ mode of ethical hacking.
Local networking uses an employee's credentials, or access rights, to gain access to the network. Physical entry uses credentials to gain access to the physical IT infrastructure.
What type of attack uses a fraudulent server with a relay address?
MITM (Man in the Middle) attacks create a server with a relay address. It is used in SMB relay attacks.
Which of the following is also known as Malicious software?
Malware
What are the elements of cybersecurity?
Network security Operational security Application security
Which of the followings are the types of scanning?
Network, vulnerability, and port
What are the port states determined by Nmap?
Open, filtered, unfiltered
Sniffing is used to perform ______________ fingerprinting.
Passive stack fingerprinting uses sniffing technologies instead of scanning.
What are the common cyber-attacks which can be used by hackers to damage network?
Phishing & Password attacks Malware & Malvertising DDoS & Drive-by downloads
Phishing is a form of ____________________.
Phishing is typically a potential attacker posing, or impersonating, a financial institution
Which of the following is not an example of physical data leakage?
Phising
What type of symmetric key algorithm using a streaming cipher to encrypt information?
RC4 uses streaming ciphers
What tool can be used to perform SNMP enumeration
SNMPUtil and IP Network Browser is SNMP enumeration tool
What is the sequence of a TCP connection
SYN-SYN ACK-ACK. A three-handed connection of TCP will start with a SYN packet followed by a SYN-ACK packet. A final ACK packet will complete the connection.
Which form of encryption does WPA use?
TKIP is used by WPA
Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?
The Cyber Security Enhancement Act 2002 deals with life sentences for hackers who recklessly endanger the lives of others, specifically transportation systems.
What are the types of scanning?
The three types of accepted scans are port, network, and vulnerability.
What are some of the most common vulnerabilities that exist in a network or system?
Additional unused features on commercial software packages. Linux is an open source code and considered to have greater security than the commercial Windows environment. Balancing security. Ease of use and functionality can open vulnerabilities that already exist. Manufacturer settings, or default settings, may provide basic protection against hacking threats, but need to change to provide advance support. The unused features of application code provide an excellent opportunity to attack and cover the attack.
Which of the following tool is used for Wi-Fi hacking?
Aircrack-ng
What are hybrid attacks?
An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols. Hybrid attacks do crack passwords that are created with replaced characters of dictionary type words
The first phase of hacking an IT system is compromise of which foundation of security?
Confidentiality
Which of the following is the most important activity in system hacking?
Cracking Password
What is the unauthorized movement of data?
Data exfiltration
What is the purpose of a Denial of Service attack?
DoS attacks force systems to stop responding by overloading the processing of the system.
Enumeration is part of what phase of ethical hacking?
Enumeration is a process of gaining access to the network by obtaining information on a user or system to be used during an attack
What is the best statement for taking advantage of a weakness in the security of an IT system?
Exploit. A weakness in security is exploited. An attack does the exploitation. A weakness is vulnerability. A threat is a potential vulnerability.
We should turn on .....to protect Our Computer from hacker.
Firewall
Which phase of hacking performs actual attack on a network or system?
Gaining Access
Why would HTTP Tunneling be used?
HTTP Tunneling is used to bypass the IDS and firewalls present on a network
Services running on a system are determined by _____________.
Hackers can identify services running on a system by the open ports that are found.
Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________.
Hacktivism is the act of malicious hacking for a cause or purpose.
Why would a hacker use a proxy server?
To hide malicious activity on the network
Why would a ping sweep be used?
To identify live systems
What does TCP/ IP stands for?
Transmission control protocol / Internet protocol
Which of the following wireless protocol uses TKIP?
WPA
Having individuals provide personal information to obtain a free offer provided through the Internet is considered what type of social engineering?
Whether using email, a fake website, or popup to entice the used, obtaining information from an individual over the Internet is a computer-based type of social engineering
Which database is queried by Whois?
Who utilizes the Internet Corporation for Assigned Names and Numbers.
What port does Telnet use?
23