study terms for class

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is the Nmap command-line switch for a full connect port scan?

-sT

This range of ports are registered ports that have been identified as usable by other applications. .

1025- 49151

Which of the following is a flag on a packet? (Choose all that apply)

ACK PSH SYN

Which of the following statements is most correct?

Active fingerprinting tools inject packets into the network.

Hackers may justify their actions based on which of the following: (Choose all that apply)

All information should be free. Access to computers and their data should be unlimited. Writing viruses, malware, or other code is not a crime.

What is the difference between an intrusion detection system and an intrusion prevention system?

An intrusion prevention system can block traffic.

This portion of the Triad determines whether information or services are available to the user when they are expected to be.

Availability

What is an essential process to the survival of operations?

Backups

This is designed to determine information about services running on a system?

Banner grabbing

A hacker with computing skills and expertise to launch harmful attacks on computer networks and who uses those skills illegally is best described as a(n):

Black-Hat Hacker

How are brute-force attacks performed?

By trying all possible combinations of characters

Which of the following are typically Web resources used to footprint a company? (Choose all that apply)

Company Web site Job search sites Internet Archive

This portion of the Triad means making sure no one gets unauthorized access to information.

Confidentiality

The hacking methodology when they attempt to remove evidence of their presence is?

Cover Tracks

This SMTP command can return all the users on a distribution list:

EXPN

If you were looking for information about a company's financial history, you would want to check the ________ database.

Edgar

This hacking methodology refers to where you extract much more detailed information?

Enumeration

This phase is a high-risk process.

Enumeration

When hackers talk about standards of behavior and moral issues of right and wrong, what are they referring to?

Ethics

An attacker who can guess the strings and use them to extract usernames will use this technique

Exploiting SNMP

What is a common potential downside to running a vulnerability scan?

False positives

By trying all possible combinations of characters

File shares Printer sharing group information usernames

To block network traffic based on sets of rules works with what device?

Firewall

This hacking methodology refers to using primarily passive methods of gaining information from a target?

Footprinting

________ is a popular NMAP option though easily detectable scanning technique.

Full connect

The MAC address uses what type of coding?

Hexadecimal

Which topology is the most common today?

Hybrid

This group is responsible for managing IP addresses, ports, protocols, and other essential numbers associated with the functioning of the Internet.

IANA

This portion of the Triad is that we expect the same data to be intact when we retrieve it again.

Integrity

What type of device would you use the web site Shodan for?

Internet of things devices

This protocol is very widely used due to the fact that it is an open standard that is used by a number of vendors in their own products—

LDAP

Information that may be obtained during a NULL session includes: (Choose all that apply)

List of users and groups list of machines users and host SIDS list of shares

Both Unix/Linux and Windows systems offer the ability to enable and configure _______.

Logging

Which of the following is used to perform network scans

NMAP

What are some of the common vulnerabilities of Windows? (Choose all that apply)

Needs patchs Passwords are weak points Firewall can be disabled

At which layer of the OSI model does a router function?

Network

The process of determining the underlying version of the system program being used is best described as ________.

OS fingerprinting

Footprinting can determine which of the following? (Choose all that apply)

Organization information employee names Operating system information

At a very basic level, a firewall is a _______ ________.

Packet filter

What is the best description of footpriniting

Passive information gathering

________ involves increasing access on a system.

Privilege escalation

This is a set of Microsoft tools designed to extract various kinds of information

PsTools suite

For GHDB Google hacking the command "allintitle" finds?

Returns pages with specific keywords.

Which of the following is the best example of passive information gathering?

Reviewing job listings posted by the targeted company

The individual responsible for releasing what is considered to be the first Internet worm was:

Robert T. Morris Jr.

A ________ is a file used in Microsoft operating systems to store passwords.

SAM

________ is an Application layer protocol that can operate over different protocols at lower layers

SMB

Port 161 is associated with which commonly used protocol or service?

SNMP

SNMP systems has which two components running: (Choose two)

SNMP agent SNMP management station

Which of the following describes an attacker who is not aware of how the software they downloaded will work?

Script Kiddie

How is the practice of tricking employees into revealing sensitive data about their computer system or infrastructure best described?

Social Engineering

Which devices can run at layer 2 of the OSI model? (Choose all that apply)

Switch Bridge

This service is a natural and easy target for many attackers through which port.

TCP 137

This term is used on a system or resource that is being evaluated for vulnerabilities.

TOE (Target of Evaluation)

How does a SYN scan differ from a full connect scan?

The SYN scan only gets to a half-open state

There are two meanings for the term security standard. (Choose two)

There are sets of standards that provide guidance for organizations The standards are managed by standards bodies

While these firewalls also inspect the packet, they commonly are specific to a particular protocol.

This firewall makes decisions based on the ports and addresses

What is the purpose of a security policy?

To provide high level statements of intent toward the security objectives and requirements of an organization.

You need to determine the path to a specific IP address. Which of the following tools is the best to use?

Tracert

An XMAS tree scan sets which of the following flags? (Choose all that apply)

URG FIN PSH

What is Google Hacking?

Using keywords in Google to narrow a search

This command is designed to return information about a user on a given system.

finger

Which OS tends to have a smallest attack surface?

linux

This Linux command lists and identifies the shared directories

showmount


Ensembles d'études connexes

CA C4 Understanding and Explaining Culture

View Set

Muscular Strength and Endurance Quiz

View Set

#05 - Chapter 20: Documenting and Reporting

View Set

Test 3 Neurological Disorders #5 - From Mom

View Set

Mastering Biology Chapter 9 Pre-Lecture Assignment 2

View Set

Chapter 13: Chief Executives and Bureaucracies

View Set

Chapter 1 Introduction to Systems Analysis and Design

View Set

California Permit Test Practice (Part 9)

View Set

CH 16: Multijurisdictional Taxation

View Set