Ethical Hacking Exam 2 Quizes

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?

BIOS-based rootkit

What programming languages are vulnerable to buffer overflow attacks?

C and C++

What type of Windows Server is the most likely server to be targeted by a computer hacker?

Domain Controller

What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android, Windows Mobile, and the Apple iPhone OS?

Java-based

What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?

NMap

What is the current file system that Windows utilizes that has strong security features?

NTFS

Which on of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely?

SNMP

Which of the following is a Window's client/server technology designed to manage patching and updating systems software from the network?

WSUS

SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?

air gap

SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration?

default

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

domain controllers

What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

enumeration

What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?

file system

Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

firmware

To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used?

footprinting

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?

limit their scan speeds

To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses?

ping

Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?

router

Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?

script

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

stealth


Ensembles d'études connexes

PrepU Patho Ch. 19 Disorders of Cardiac Function

View Set

APES chapter 4 practice problems

View Set

EAQ quiz #1 - sedative & hypnotics

View Set

MKTG 320 - TEST 2 - DR CANO (ch. 5-9)

View Set

Circles & Volume: Part 1 Unit Test Review

View Set

Survey of Operating Systems Chapter 9 - Linux on the Desktop

View Set

Bible Competition Packet (Genesis Ch 17-19)

View Set

Pharmacology Made Easy 4.0 - Introduction to Pharmacology

View Set

Exam 3 Chapter 17a STDs and AIDS

View Set