SEC425 Exam 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What type of information is gathered by an attacker through Whois database analysis and tracerouting? - Usernames, passwords, and so on - Background of the organization - DNS records and related information - Publicly available email addresses

DNS records and related information

Which of the following NTP commands determines where the NTP server obtains the time from and follows the chain of NTP servers back to its primary time source? - ntpdc - ntpq - ntpdate - ntptrace

ntptrace

Which of the following port number is used to exploit vulnerabilities within DNS servers to launch attacks? - UDP 137 - TCP/UDP 135 - TCP 139 - TCP/UDP 53

TCP/UDP 53

Which of the following TCP communication flags confirms the receipt of a transmission and identifies the next expected sequence number? - FIN flag - ACK flag - RST flag - SYN flag

ACK flag

Which of the following IDS/firewall evasion techniques is used by an attacker to bypass Internet censors and evade certain IDS and firewall rules? - Anonymizers - Sending bad checksums - IP address decoy - Source port manipulation

Anonymizers

Which of the following techniques does an attacker use to snoop on the communication between users or devices and record private information to launch passive attacks? - Spoofing - Eavesdropping - Privilege escalation - Session hijacking

Eavesdropping

Which of the following techniques is used to create complex search engine queries? - Bing search - DuckDuckGo - Yahoo search - Google hacking

Google hacking

Which of the following ping methods is effective in identifying active hosts similar to the ICMP timestamp ping, specifically when the administrator blocks the conventional ICMP ECHO ping? - ICMP ECHO ping sweep - ICMP ECHO ping scan - ICMP address mask ping scan - UDP ping scan

ICMP address mask ping scan

In which of the following hacking phases does an attacker try to detect listening ports to find information about the nature of services running on the target machine? - Scanning - Maintaining access - Clearing tracks - Gaining access

Scanning

What is the output returned by search engines when extracting critical details about a target from the Internet? - Operating systems, location of web servers, users, and passwords - Advanced search operators - Open ports and services - Search engine results pages ("SERPs")

Search engine results pages ("SERPs")


Ensembles d'études connexes

ch 53-Deinstitutionalization of American Marriage, ch 52- Bad boys, ch 54-promises i can keep, ch 51-a school in a garden, ch 58-Cosmopolitan Canopy,ch 56--Regime Change and Revolution, Chapter 41: McDonald's

View Set

PMP® Exam Questions - Chapter 7 Project Cost Management

View Set

Essential Neuroscience 3rd Ed Siegel and Sapru Quizzes Ch 1, 3, 5, 6, 8-11, 13, 14, 18-20, 22, 25-27

View Set

Italian Study Guide Final 7 (question-answer)

View Set

10.10 Unit Test: The House on Mango Street

View Set

Mnemonics for Early/Middle/Late 8 (Shriberg)

View Set