ethical hacking

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

the main difference between IPV4 and IPV6 ip address is the length of the IP address. the length of the IPV6 address is _____

128 bit

in enumeration attack the attacker mainly exploits the NETBIOS service, the netbios operations at what port

139

To take input from user on a website _________ tag can be used/embedded in the HTML code.

<form>

Windows Server 2021 and Windows 8 & 10 introduced which protection feature to prevent pass-the-hash attacks?

Authentication Silos

the ip address 192.168.2.1 belongs to class _____________

C

________ maintains the list of vulnerabilities and assigns numbers to all reported vulnerabilities for future referencing / vulnerability assessment tools.

CVE (Common Vulnerabilities and Exposures)

___________ attack is also known as Session Riding Attack, where the attacker tricks the users & make them click the malicious link which can change the users passwords or can transfer funds from their account etc.

Cross Site Request Forgery

which of the following is NOT type of pen testing a. web app b. mobile app c. network d. physical access control of resources

D. physical access control of resources

if the source code of the web Application is not available for vulnerability assessment then ________ is used for vulnerability analysis

DAST

which of the following is NOT database connectivity technology: ODBC OLEDB Active x data objects DBMS

DBMS

the process that enables the attacker to see all the host computers (network diagram) on a company network is called __________

DNS Zone Transfer

In the null scan, the attacker sends a packet with all zeros (0) flags. Upon receiving on the Null packet, the open ports of the target computer responds with ___________.

Doesn't respond at all

what type of windows server is the most likely server to be targeted by a computer hacker?

Domain Controller

what enumeration tool is extremely useful when working with Windows NT, 2000, and windows XP systems?

DumpSec

If Firewalls and IDS are properly configured then we can avoid all web application attacks.

FALSE

the users/clients can see the pho scripts/codes on their browser when they visit a php website/webapp.

FALSE

windows 8 and 10 are more susceptible to a enumeration attack.

FALSE

in the TCP protocol, after the SYN protocol completes (three way handshake) and communication ends between the client and the server then both send a packet with _________ flag?

FIN

The _________________ Utility (software) extracts metadata & documents to reveal the document creator emails, ip addresses, and other relevant information about the target website

FOCA

which of the tools can be used to send Ping common to multiple devices simultaneously FPING HPING NMAP All of the above

FPING, HPING, NMAP

the shell and Bash scripts are two different scripting languages

False

Using HTTP commands if the user gets 403 error then it means ____________

Forbidden

what boot loader will allow your computer or laptop to start in both Windows and Linux?

Grub

which of the following Port scanning tool can craft the IP packets with modified IP address and can bypass filtering device: FPING NMAP KMAP HPING

HPING

the ___________ commands allows the pen-tester to pull information from web servers using even the web browsers.

HTTP

which of the following is an excellent GUI tool for managing Windows hosts on the network and is capable of displaying graphical representations of several areas? IIS Zion NetDDE Hyena

Hyena

______________ occurs if a web application accepts the untrusted/malicious data as input without validating it.

Injection vulnerability

the largest WAN on earth is _______

Internet

The Artificial Intelligence tool to gather competitive intelligence from website is _________

Metis

Visual Basic scripting language is developed by ________ and can convert a static webpage into dynamic webpage

Microsoft

which of the following is the standardized Port Scanning tool

NMAP

which of the following provides interface that allows computers to communicate across a local area network (LAN)? NetBIOS BIOS NetAPP NetAPI

NetBIOS

what does the NBT part of NBTScan stand for?

NetBIOS over TCP/IP

The __________ is the Open source utility which allows the user to run programs through client interface and can find vulnerabilities of the remote hosts

OpenVAS

________ can be used to convert a static website into a dynamic website

PHP, Javascript, VBS (visual basic script)

the two vulnerabilities cause insecure Direct Object Reference attack; Sequential Numbering (Automatic Filling) & ________

Poor Access Control

In the UDP Scan, (which scans all UDP ports), the closed ports responds with ______________

Port unreachable

in the SYN scan, if the target system is turned off then it responds with ________ to SYN scan

RST/ACK

The ______ analyzes the source code of the web application for Vulnerabilities

SAST

Which one of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely SNMP TFTP TLS TTS

SNMP

The ________________ are flexible programs which allows the users to enter the commands in a text file to automate the tasks and execute all commands simultaneously

Scripts

The _____________ occurs when a client use public computer to access sensitive accounts & sensitive information gets cached on local PC.

Sensitive Data Exposure

HTML is still the foundation of many web application and mainly used to design _________ websites.

Static

In sec ops center (SOC) if an incident responder couldn't resolve the problem (incident) then the ticket will be escalated to _____________

Subject Matter Expert

When security professionals create a packet for port scanning then they can choose to specifically set which of the fields to help initiate the response from the victim/host

TRUE

if an organization is unable to avoid the risk then they try to mitigate its impact.

TRUE

the connect scan provides the detailed report (OS, trace-route, firewall info, port status, etc.) about the host but it requires the SYN protocol to complete handshake with the target.

TRUE

the scripting languages allow the user to design robust security features using power of scripting languages

TRUE

CVSS is used to express the vulnerability in a quantitative matter.

TRUE CVSS (Common Vulnerability Scoring System)

in XMAS scan PSH, URG, and FIN flags are set and closed ports respond with RST or RST/ACK

True

Web application is an application software which runs on ____ and can be accessed through the internet

Web server

_______ is a person hired by the companies to find vulnerabilities and proved suggestions to over affected areas

White Hat hacker

__________ utility is used to collect information (e.g. IP address, domain owner etc. ) about specific domain

Whois

______ is a vulnerability assessment tool which allows the vulnerability assessment analyst to passively discover the vulnerabilities of the systems/computers.

WireShark

the ____________ attack occurs, if an attacker successfully injects & stores malicious script on a web server to victimize all visitors of that website.

XSS Stored

which one of the following vulnerability assessment tools actively engages the target to find its vulnerabilities: wireshark dsniff urlsnarff Zed attack proxy

Zed attack proxy

in SOC the ______ reads the tickets and verifies if its a security related issue or not

alert analyst

the FTP HTTP HTTPS and SMTP protocols are location on _____ layer

application

in a vulnerability assessment the first component of the assessment is ________.

assest identification

________ can be information device or any other computational systems which are protecting from unauthorized access

assets

the HTTPS mainly uses SSL technology to ensure a secure bidirectional communication where _________ encryption is used in SSL

asymmetric

_________ is a checklist against which the system is evaluated and audited for its security posture.

baseline

if a company doesn't wish to disclose its employees that a pen test is being performed, then which pen test model will be more suitable

black box

The ___________ http command can dynamically switch to tunnel connection such as SSL (required to establish VPN connection).

connect

what process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

enumeration

malware or script that allows attacker to gain unauthorized access to systems is called _________

exploit

which of the following vulnerability assessment models is also known as hacker vulnerability assessment model? internal external hybrid none

external

ICMP protocol (ping/trace route) is a connection oriented protocol

false

federal govt (deep of justice) considers port scanning as an illegal activity

false

the TFTP provides more secure uploading and downloading as compares to FTP.

false

the vulnerability assessment tools can also identify the Zero Day attacks.

false

vulnerability assessment and pen testing are both of the same things

false

if a specific port is protected by a firewall, then Port scanning will return _____ status of port

filtered

the active process of finding information on a company's network (OS, Ports status, DNS Zone, etc.) is called _____

finger printing

Which of the following is a useful enumeration tool that enables youth find out who is logged into **nix system with one simple command? net utility finger utility nix utility point utility

finger utility

the passive process of finding information o na company's network is called _____

foot printing

the bug bounty hunters are also referred to as _______

grey hat hacker

a hacker who hacked a companies databases t expose scam/tax fraud that hacker is called ________

hacktivist

at __________ layer the IP address of the src and dest are added

internet

Which of the following commands is a powerful enumeration tool included with Windows? NessusWX nbtstat NetDDE Netmon Agent

nbtstat

which of the following commands gives you a quick way to see if there are any shared resources on a computer or server? nbtstat net view NetDDE

net view

TCP/IP protocol Application, transport, internet, and _________

network

which of the following is NOT a port status: closed open partial filtered

partial

the ___________ identities the IP addresses belong to the alive hosts not he network

ping sweep

the method of finding services offered by a host is called _______

port scanning

the ACK scan is mainly used to detect __________

presence of firewall

which of the following is the first step of a typical cyber attack a. reconnaissance b. enumeration c. vulnerability assessment d. creating exploit

reconnaissance

typically we design a network for information exchange and ____________

resource sharing

if the vulnerability gets exploited, then what will be its impact on the organization _____________?

risk assessment

what feature implemented in windows 8.1 prevents the execution of non trusted book content preventing rootkits?

secure boot

________ allows the network admins to divide the larger networks into smaller network or small broadcast domains

subnetting

the designing of the attack tree is the sub-component of _____ of the vulnerability assessment.

threat identification

at _______ layer the data os broken up into small packets also we add ISN for reassembly at the receivers side

transport

the source and dest port numbers are added at ___________ layer in TCP/IP protocol

transport

CISSP is mainly designed for people having good security related experience. More managerial than technical

true

In TCP/IP protocol at network layer rather than adding the MAC address of dest, the MAC address of the gateway router is added.

true

NMAP tool can be used for network analysis (to find IP addresses and trace route) and port scanning

true

the process of defining, identify, and classify the vulnerabilities of the systems, computers, and networks is called _____________

vulnerability assessment

in _______ pen test model the ethical hacker / pen tester is aware of all network information, resources, OS, and can interact with employees

white box

what feature implemented in Windows server 2016 allows for application isolation to protect applications from one another?

windows containers


Ensembles d'études connexes

Chapter 11 and 12 - Axial Muscles and appendicular Muscles

View Set

Chapter 8 From the Great Crash to Wounded Knee

View Set

BCIS-5740 - Security Personnel + Security Technology (Chapter 7 and Chapter 8 )

View Set

The Strategic Management Process

View Set

Financial Statement analysis Self Test Chapter 13

View Set

Finance 3000 Chapter 5 Ohio University (online)

View Set

Chapter 7 Intermediate Accounting I: Brief Exercises

View Set

Conjunctions and Interjections Test

View Set