TestOut Ethical Hacker Pro Final Review (Practice Questions)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

auditpol

Phil, a hacker, has found his way into a secure system. He is looking for a Windows utility he can use to retrieve, set, back up, and restore logging policies. Which of the following utilities should he consider?

web applications

SQL injections are a result of which of the following flaws?

Device-to-device

Anabel purchased a smart speaker. She connected it to all the smart devices in her home. Which of the following communication models is she using?

FTP uses clear-text passwords.

As part of your penetration test, you have captured an FTP session, as shown below. Which of the following concerns or recommendations will you include in your report?

Use a Wi-Fi predictive planning tool to determine where to place your access points.

The ACME company has decided to implement wireless technology to help improve the productivity of their employees. As the cybersecurity specialist for this company, you have the responsibility of seeing that the wireless network is as secure as possible. Which of the following best describes one of the first countermeasures that should be used to ensure wireless security?

Stegtanography

The method of embedding data into legitimate files like graphics to hide it and then extracting the data once it reaches its destination is called:

-n

The ping command is designed to test connectivity between two computers. There are several command options available to customize ping, making it a useful tool for network administrators. On Windows, the default number of ping requests is set is four. Which of the following command options will change the default number of ping requests?

A crypter can encrypt, obfuscate, and manipulate malware to make it difficult to detect

The program shown is a crypter. Which of the following best defines what this program does?

is an SQL statement that is hard to read and understand

There are several types of signature evasion techniques. Which of the following best describes the obfuscated codes technique?

Steganography

Cameron wants to send secret messages to his friend Brandon, who works at a competitor's company. To secure these message, he uses a technique to hide a secret message within a video. Which of the following techniques is he using?

Only packets with either a source or destination address on 192.168.0.0 network are captured

Using Wireshark, you have used a filter to help capture only the desired types of packets. Using the information shown in the image, which of the following best describes the effects of using the net 192.168.0.0 filter?

use encryption for all sensitive traffic

Using sniffers has become one way for an attacker to view and gather network traffic. If an attacker overcomes your defenses and obtains network traffic, which of the following is the best countermeasure for securing the captured network traffic?

cookie parameter tampering

Web applications use sessions to establish a connection and transfer sensitive information between a client and a server. Attacking an application's session management mechanisms can help you get around some of the authentication controls and allow you to use the permissions of more privileged application users. Which of the following type of attacks could you use to accomplish this?

HIDS and NIDS

What are the two types of Intrusion Detection Systems (IDSs)?

anomaly-based

Which of the following IDS detection types compare behavior to baseline profiles or network behavior baselines?

Log off immediately after using a web application. Clear the history after using a web application, and don't allow your browser to save your login details.

Which of the following best describes the countermeasures you would take against a cross-site request forgery attack?

The iOS operating system stack.

Which of the following best describes this image?

SaaS

Which of the following cloud computing service models delivers software applications to a client either over the Internet or on a local area network?

IoT architecture

Which of the following has five layers of structure that include Edge technology, Access gateway, Internet, Middleware, and Application?

Sirefef

Which of the following is also known as ZeroAccess and has virus, Trojan horse, and rootkit components?

malicious websites

Which of the following mobile security concerns is characterized by malicious code that specifically targets mobile devices?

Hacktivism, profit, and damage reputation

Which of the following motivates attackers to use DoS and DDoS attacks?

Android

Which of the following operating systems is the most prevalent in the smartphone market?

Dropper

Which of the following parts of the Trojan horse packet installs the malicious code onto the target machine?

Acceptable use policy

Which of the following policies best governs the use of bring-your-own-device (BYOD) that connect with an organization's private network?

IPsec

Which of the following protocols is one of the most common methods used to protect packet information and defend against network attacks in VPNs?

passwords are being sent in clear text

While performing a penetration test, you captured a few HTTP POST packets using Wireshark. After examining the selected packet, which of the following concerns or recommendations will you include in your report?

airodump-ng wlp1s0mon

You are a cybersecurity consultant. The company hiring you suspects that employees are connecting to a rogue access point (AP). You need to find the name of the hidden rogue AP so it can be deauthorized. Which of the following commands would help you locate the rouge access point from the wlp1s0 interface and produce the results shown?

WebInspect

You are analyzing the web applications in your company and have newly discovered vulnerabilities. You want to launch a denial-of-service (DoS) attack against the web server. Which of the following tools would you most likely use?

l2ping

A user is having trouble connecting to a newly purchased Bluetooth device. An administrator troubleshoots the device using a Linux computer with BlueZ installed. The administrator sends an echo request to the device's Bluetooth MAC address to determine whether the device responds. Which of the following commands was used?

Launch

A virus replicated itself throughout the infected systems and is executing its payload. Which of the following phrases of the virus lifecycle is the virus in?

spoofing methods

ARP, DNS, and IP are all examples of which of the following?

Burp Suite

HTTP headers can contain hidden parameters such as user-agent, host headers, accept, and referrer. Which of the following tool could you use to discover hidden parameters?

Default, weak, and hardcoded credentials

Joelle, an app developer, created an app using two-factor authentication (2FA) and requires strong user passwords. Which of the following IoT security challenges is she trying to overcome?

hire a penetration tester

Lorena, the CIO, wants to ensure that the company's security practices and policies match well with their firewall security configuration for maximum protection against hacking. Which of the following actions should Lorena take?

Run anti-malware scans

Part of a penetration test is checking for malware vulnerabilities. During this process, the penetration tester will need to manually check many different areas of the system. After these checks have been completed, which of the following is the next step?

craft a malicious probe packet to scan for services

An attacker is attempting to determine whether a system is a honeypot. Which of the following actions should the attacker take?

Any device that can communicate over the intranet can be hacked.

An attacker may use compromised websites and emails to distribute specially designed malware to poorly secured devices. This malware provides an access point to the attacker, which he can use to control the device. Which of the following devices can the attacker use?

malicious insiders

Strict supply chain management, comprehensive supplier assessment, HR resource requirements, transparent information security and management, compliance reporting, and a security breach notification process are defenses against which of the following cloud computing threats?

launch a SQL attack

The SQL injection methodology has four parts. Which of the following parts is similar to playing the game 20 questions?

OSI layers 2 (DataLink), 4 (Transport), and 7 (Application)

An older technique for defeating honeypots is to use tarpits, which sometimes operate at different levels of the OSI model, depending on their function. Which of the following layers of the OSI model do tarpits work at?

Sheep dipping

Analyzing emails, suspect files, and systems for malware is known as which of the following?

scripting errors

Upload bombing and poison null byte attacks are designed to target which of the following web application vulnerabilities?

sdptool

Which of the following Bluetooth discovery tools will produce the output shown below?

IKE, AH, and ESP

Which of the following are protocols included in the IPsec architecture?

Ransomeware attack

Which of the following attacks utilizes encryption to deny a user access to a device?

An attacker changes the Bluetooth address of his own device to match the address of a target device so that the data meant for the victim device reaches the attacker's device first.

Which of the following best describes Bluetooth MAC spoofing?

A tool that can remove files and clear internet browsing history. It also frees up hard disk space. It clears the temporary files, history, and cookies from each of the six major search engines.

Which of the following best describes CCleaner?

Hiding evidence

Which of the following could a hacker use Alternate Data Streams (ADS) for?

Adaptive chosen plain text

Which of the following cryptography attacks is characterized by the attacker making a series of interactive queries and choosing subsequent plain texts based on the information from the previous encryption?

A combination of an on-device application or agent that communicates with a backend server to receive policies and settings.

Which of the following describes Mobile Device Management software?

A security architecture that ensures data connections between entities are validated and secure.

Which of the following describes a PKI?

Apache Web Server

Which of the following is an open-source web server technology?

Find and fix software flaws continuously, use strong passwords, and use encryption.

Which of the following is the best defense against cloud account and service traffic hijacking?

Information gathering, vulnerability scanning, launch attack, gain remote access, maintain access

Which of the following is the correct order for a hacker to launch an attack?

firewalking

Which of the following is the process of determining the configuration of ACLs by sending a firewall TCP and UDP packets?

Yagi

Which of the following types of wireless antenna is shown?

Changing a hacker's network card to match a legitimate address being used on a network.

You have just discovered that a hacker is trying to penetrate your network using MAC spoofing. Which of the following best describes MAC spoofing?

-SX port 443

A security analyst is using tcpdump to capture suspicious traffic detected on port 443 of a server. The analyst wants to capture the entire packet with hexadecimal and ascii output only. Which of the following tcpdump options will achieve this output?

ClamAV

Daphne has determined that she has malware on her Linux machine. She prefers to only use open-source software. Which anti-malware software should she use?

Private keys

Above all else, which of the following must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?

snort

Allen, the network administrator, needs a tool that can do network intrusion prevention and intrusion detection, capture packets, and monitor information. Which of the following tools would he most likely select?

netstat -f -b

Daphne suspects a Trojan horse is installed on her system. She wants to check all active network connections to see which programs are making connections and the FQDN of where those programs are connecting to. Which command will allow her to do this?

footprinting

Jin, a penetration tester, was hired to perform a black box penetration test. He decides to test their firewall. Which of the following techniques should he use first?

Cain and Abel, Ettercap, and TCPDump

Which of the following are network sniffing tools?

An entity that issues digital certificates.

Which of the following best describes a certificate authority (CA)?

A user is tricked into believing that a legitimate website is requesting their login information.

Which of the following best describes a phishing attack?

Performs a loopback test to a target resource.

Which of the following best describes the HTTP Request/Response TRACE?

misuse detection

Which of the following is another name for the signature-based detection method?

They were created to store information about user preferences and web activities.

Which of the following statements is true regarding cookies?

Integral

Which type of cryptanalysis method is based on substitution-permutation networks?

A black hat hacker

Who would be most likely to erase only parts of the system log files?

hackalert

You are looking for a web server security tool that will detect hidden malware in websites and advertisements. Which of the following security tools would you most likely use?

configuration

Firewalls, whether hardware or software, are only as effective as their __________?

COREImpact Pro

Frank wants to do a penetration test. He is looking for a tool that checks for vulnerabilities in web applications, network systems, wireless networks, mobile devices, and defense systems such as IDS or IPS. Which of the following tools would you recommend to him?

a virtual machine

Frank, an attacker, has gained access to your network. He decides to cause an illegal instruction. He watches the timing to handle an illegal instruction. Which of the following is he testing for?

footprinting

Gathering information about a system, its components, and how they work together is known as ________?

[email protected]

You have been asked to perform a penetration test for a company to see if any sensitive information can be captured by a potential hacker. You have used Wireshark to capture a series of packets. Using the tcp contains Invoice filter, you have found one packet. Using the captured information shown, which of the following is the account manager's email address?

natural disasters

A company has implemented the following defenses: - The data center is located in safe geographical area. - Backups are in different locations. - Mitigation measures are in place. - A disaster recovery plan is in place. Which of the following cloud computing threats has the customer implemented countermeasures against?

Need to bring costs down and growing demand for storage.

Google Cloud, Amazon Web Services, and Microsoft Azure are some of the most widely used cloud storage solutions for enterprises. Which of the following factors prompts companies to take advantage of cloud storage?

rapid elasticity

A company has subscribed to a cloud service that offers cloud applications and storage space. Through acquisition, the number of company employees quickly doubled. The cloud service vendor was able to add cloud services for these additional employees without requiring hardware changes. Which of the following cloud concepts does this represent?

fraggle attack

A hacker has discovered UDP protocol weaknesses on a target system. The hacker attempts to send large numbers of UDP packets from a system with a spoofed IP address, which broadcasts out to the network in an attempt to flood the target system with an overwhelming amount of UDP responses. Which of the following DoS attacks is the hacker attempting to use?

Compromise data integrity

A hacker has used an SQL injection to deface a web page by inserting malicious content and altering the contents of the database. Which of the following did the hacker accomplish?

Worm

Heather is performing a penetration test of her client's malware protection. She had developed a malware program that doesn't require any user interaction and wants to see how far it will spread through the network. Which of the following types of malware is she using?

TCP packet filtering

IP address spoofing, fragmentation attacks, using proxy servers, ICMP tunneling, and ACK tunneling are all examples of which of the following firewall penetration testing techniques?

Service hijacking through network sniffing.

If an attacker's intent is to discover and then use sensitive data like passwords, session cookies, and other security configurations such as UDDI, SOAP, and WSDL, which of the following cloud computing attacks is he using?

careful configuration and penetration testing on the front end

In 2011, Sony was targeted by an SQL injection attack that compromised over a million emails, usernames, and passwords. Which of the following could have prevented the attack?

active hijacking

Jason, an attacker, has manipulated a client's connection to disconnect the real client and allow the server to think that he is the authenticated user. Which of the following describes what he has done?

bluebugging

Jim, a smartphone user, receives a bill from his provider that contains fees for calling international numbers he is sure he hasn't called. Which of the following forms of Bluetooth hacking was most likely used to attack his phone?

- Configure the device to remotely wipe as soon as it is reported lost. - Configure the device to wipe after a number of failed login attempts.

Jose, a medical doctor, has a mobile device that contains sensitive patient information. He is concerned about unauthorized access to the data if the device is lost or stolen. Which of the following are the best options for preventing this from happening? (Select two.)

root the Android device

Linda, an Android user, wants to remove unwanted applications (bloatware) that are pre-installed on her device. Which of the following actions must she take?

Malicious alternate data streams

Mark is moving files from a device that is formatted using NFTS to a device that is formatted using FAT. Which of the following is he trying to get rid of?

Mary's private key

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which of the following cryptographic keys would Mary use to create the digital signature?

CoffeeShop

From your Kali Linux computer, you have used a terminal and the airodump-ng command to scan for wireless access points. From the results shown, which of the following is most likely a rogue access point?

Devices, gateway, data storage, and remote control

What are the four primary systems of IoT technology?

A collection of software that detects and analyzes malware

Which of the following best describes an anti-virus sensor system?

Attackers use numerous computers and connections.

Which of the following best describes the key difference between DoS and DDoS?

Collect several session IDs that have been used before and then analyze them to determine a pattern.

Which of the following best describes the process of using prediction to gain session tokens in an Application level hijacking attack?

To find information that will help breach a victim's wireless network.

Which of the following best describes the purpose of the wireless attack type known as wardriving?

uses a 168-bit key

Which of the following is a characteristic of Triple DES (3DES)?

Mirroring

Which of the following steps in the web server hacking methodology involves setting up a web server sandbox to gain hands-on experience attacking a web server?

The provider is responsible for all the security

You are using software as a service (SaaS) in your office. Who is responsible for the security of the data stored in the cloud?

System log files

You believe your system has been hacked. Which of the following is the first thing you should check?

session fixation attack

A penetration tester discovers a vulnerable application and is able to hijack a website's URL hyperlink session ID. The penetration tester is able to intercept the session ID; when the vulnerable application sends the URL hyperlink to the website, the session IDs are embedded in the hyperlink. Which of the following types of session hijacking countermeasures is the penetration tester using?

BitLocker

Alan wants to implement a security tool that protects the entire contents of a hard drive and prevents access even if the drive is moved to another system. Which of the following tools should he choose?

The inventory will show the device as vulnerable

Alan, an ethical hacker, roots or jailbreaks a mobile device. He checks the inventory information reported by the mobile device management (MDM) software that manages the mobile device. Which of the following describes what he expects to see in the inventory?

This detection method can include malformed messages and sequencing errors.

An IDS can perform many types of intrusion detections. Three common detection methods are signature-based, anomaly-based, and protocol-based. Which of the following best describes protocol-based detection?

true positive

An IT technician receives an IDS alert on the company network she manages. A seemingly random user now has administration privileges in the system, some files are missing, and other files seem to have just been created. Which of the following alerts did this technician receive?

a honeypot

An attacker conducts a normal port scan on a host and detects protocols used by a Windows operating system and protocols used by a Linux operating system. Which of the following might this indicate?

hijacking web credentials

An attacker is attempting to connect to a database using a web application system account instead of user-provided credentials. Which of the following methods is the attacker attempting to use?

Lower the Bluetooth power setting on the smartphone and headset

Ann has a corner office that looks out on a patio that is frequently occupied by tourists. She likes the convenience of her Bluetooth headset paired to her smartphone, but is concerned that her conversations could be intercepted by an attacker sitting on the patio. Which of the following countermeasures would be the most effective for protecting her conversations?

Scanning uses live system monitoring to detect malware immediately. This technique utilizes a database that needs to be updated regularly. Scanning is the quickest way to catch malware programs.

Anti-malware software utilizes different methods to detect malware. One of these methods is scanning. Which of the following best describes scanning?

decline any entry that includes binary input, comment characters, or escape sequences

As a penetration tester, you have found there is no data validation being completed at the server, which could leave the web applications vulnerable to SQL injection attacks. Which of the following could you use to help defend against this vulnerability?

ARP poisoning

As part of your penetration test, you are using Ettercap in an attempt to spoof DNS. You have configured the target and have selected the dns_spoof option (see image). To complete the configuration of this test, which of the following MITM options should you select?

ARP poisoning is occurring, as indicated by the duplicate response IP address

As the cybersecurity specialist for your company, you believe a hacker is using ARP poisoning to infiltrate your network. To test your hypothesis, you have used Wireshark to capture packets and then filtered the results. After examining the results, which of the following is your best assessment regarding ARP poisoning?

A man-in-the-middle spoofing attack is possible due to two DHCP ACK packets.

As the cybersecurity specialist for your company, you have used Wireshark to check for man-in-the-middle DHCP spoofing attacks using the bootp filter. After examining the results, what is your best assessment?

symmetric

Bob encrypts a message using a key and sends it to Alice. Alice decrypts the message using the same key. Which of the following types of encryption keys is being used?

black hole filtering

Creating an area of the network where offending traffic is forwarded and dropped is known as _________?

TLS

Donna is configuring the encryption settings on her email server. She is given a choice of encryption protocols and has been instructed to use the protocol that has the most improvements. Which of the following cryptographic protocols should she choose?

beSTORM

During a penetration test, Omar found unpredicted responses from an application. Which of the following tools was he most likely using while assessing the network?

Trojan horse

Heather wants to gain remote access to Randy's machine. She has developed a program and hidden it inside a legitimate program that she is sure Randy will install on his machine. Which of the following types of malware is she using?

services can be set to throttle or even shut down

It is important to be prepared for a DoS attack. These attacks are becoming more common. Which of the following best describes the response you should take for a service degradation?

touch

James, a hacker, has hacked into a Unix system and wants to change the timestamps on some files to hide his tracks. Which of the following timestamp tools would he most likely use?

footprinting

James, a penetration tester, uses nmap to locate mobile devices attached to a network. Which of the following mobile device penetration testing stages is being implemented?

Integrity-based

Jerry runs a tool to scan a clean system to create a database. The tool then scans the system again and compares the second scan to the clean database. Which of the following detection methods is Jerry using?

hardware

Jessica needs to set up a firewall to protect her internal network from the Internet. Which of the following would be the best type of firewall for her to use?

snort inline

Julie is looking for a honeypot detection tool that is capable of packet manipulation. Which of the following tools should she use?

Create a local CA and generate a self-signed certificate.

Kathy doesn't want to purchase a digital certificate from a public certificate authority, but needs to establish a PKI in her local network. Which of the follow actions should she take?

honeyBOT

Mark, an ethical hacker, is looking for a honeypot tool that will simulate a mischievous protocol such as devil or mydoom. Which of the following honeypot tools should he use?

Sam's public key

Mary is using asymmetric cryptography to send a message to Sam so that only Sam can read it. Which of the following keys should she use to encrypt the message?

nmap -D RND:25 10.10.10.1

Nmap provides many commands and scripts that are used to evade firewalls and intrusion detection systems. Which of the following is the proper nmap command to use the decoy option?

JPS

Patrick is planning a penetration test for a client. As part of this test, he will perform a phishing attack. He needs to create a virus to distribute through email and run a custom script that will let him track who has run the virus. Which of the following programs will allow him to create this virus?

once all the legal contracts are signed, formalities are settled, and permissions are given

Penetration testing is a practice conducted by an ethical hacker to see how an organization's security policies and security practices measure up to the organization's actual overall successful system security. When can an ethical hacker start the penetration test?

DoS attack types

Ping of death, teardrop, SYN flood, Smurf, and fraggle are all examples of which of the following?

honeypot

Ports that show a particular service running but deny a three-way handshake connection indicate the potential presence of which of the following?

He must send identifying data with his certificate request to a registration authority (RA).

Robert, an IT administrator, is working for a newly formed company. He needs a digital certificate to send and receive data securely in a Public Key Infrastructure (PKI). Which of the following requests should he submit?

VeraCrypt

Robert, an IT administrator, is working for a newly formed company. He needs a digital certificate to send and receive data securely in a Public Key Infrastructure (PKI). Which of the following requests should he submit?

defend the network against IDS evasions

Robin, an IT technician, has implemented identification and detection techniques based on the ability to distinguish legitimate traffic from illegitimate traffic over the network. Which of the following is he trying to achieve?

Host integrity monitoring

Rudy is analyzing a piece of malware discovered in a pentest. He has taken a snapshot of the test system and will run the malware. He will take a snapshot afterwards and monitor different components such as ports, processes, event logs, and more for any changes. Which of the following processes is he using?

DoS attack

The following are countermeasures you would take against a web application attack: - Secure remote administration and connectivity testing. - Perform extensive input validation. - Configure the firewall to deny ICMP traffic. - Stop data processed by the attacker from being executed. Which of the following attacks would these countermeasures prevent?

attackers need to take a look at the /etc/fstab file or execute the mount command

User-Mode-Linux (UML) is an open-source tool used to create virtual machines. It's efficient for deploying honeypots. One of the big issues with UML is that it doesn't use a real hard disk, but a fake IDE device called /dev/ubd*. How can an attacker find a UML system?

ip.src ne 192.168.142.3

Using Wireshark filtering, you want to see all traffic except IP address 192.168.142.3. Which of the following is the best command to filter a specific source IP address?

Only packets with 192.168.0.34 in either the source or destination address are captured

Using Wireshark, you have used a filter to help capture only the desired types of packets. Using the information shown in the image, which of the following best describes the effects of using the host 192.168.0.34 filter?

nmap -D RND:10 target_IP_address

When it comes to obfuscation mechanisms, nmap has the ability to generate decoys, meaning that detection of the actual scanning system becomes much more difficult. Which of the following is the proper nmap command?

access controls

Which key area in the mobile device security model is supported by device designers requiring passwords, biometrics, and two-factor authentication methods?

Is suitable for small amounts of data and small devices, such as smartphones.

Which of the follow is a characteristic of Elliptic Curve Cryptography (ECC)?

Use hidden mode when your Bluetooth device is enabled

Which of the following Bluetooth attack countermeasures would help prevent other devices from finding your Bluetooth device that is in continuous operation?

sdptool

Which of the following Bluetooth configuration and discovery tools can be used to check which services are made available by a specific device and can work when the device is not discoverable, but is still nearby?

hcitool inq

Which of the following Bluetooth discovery tool commands will show the Bluetooth MAC address, clock offset, and class of each discovered device?

btlejuice

Which of the following Bluetooth hacking tools is a complete framework to perform man-in-the-middle attacks on Bluetooth smart devices?

The creation of Bluetooth bugging and eavesdropping devices

Which of the following Bluetooth threats has increased due to the availability of software that can be used to activate Bluetooth cameras and microphones?

3xx: Redirection

Which of the following HTTP response messages would you receive if additional action needs to be taken to complete the request?

Wrote packet capture files from interface 1 into mycap.pcap

Which of the following actions was performed using the WinDump command line sniffer?

a web server technology

Which of the following best describes Microsoft Internet Information Services (IIS)?

A hacker overwhelms or damages a system and prevents users from accessing a service.

Which of the following best describes a DOS attack?

The hacker uses phishing scams by making a domain name that is almost the same as the cloud service provider.

Which of the following best describes a cybersquatting cloud computing attack?

Uses only one key to encrypt and decrypt data

Which of the following best describes a feature of symmetric encryption?

A honeypot's purpose is to look like a legitimate network resource.

Which of the following best describes a honeypot?

Operates at Layer 7 (Application) of the OSI model.

Which of the following best describes a proxy server?

Redirects all traffic before it is forwarded to a server, so the redirected system takes the impact.

Which of the following best describes a reverse proxy method for protecting a system from a DoS attack?

A hacker installing an unauthorized access point within a company.

Which of the following best describes a rogue access point attack?

Can modify the operating system and the utilities of the target system

Which of the following best describes a rootkit?

Determines the legitimacy of traffic based on the state of the connection from which the traffic originated.

Which of the following best describes a stateful inspection?

A web application is software that has been installed on a web server.

Which of the following best describes a web application?

A networking hardware device that allows other Wi-Fi devices to connect to a wired network.

Which of the following best describes a wireless access point?

A physical location where people may obtain free internet access using Wi-Fi. Correct Answer:

Which of the following best describes a wireless hotspot?

The packet's sender designates the route that a packet should take through the network.

Which of the following best describes source routing?

A penetration suite that runs on Linux that can implement several attacks, including bluebug, bluesnarf, and bluesmack, and also performs Bluetooth address spoofing.

Which of the following best describes the Bluediving hacking tool?

Delivers everything a developer needs to build an application on the cloud infrastructure.

Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?

a tool used to find SQL injections on a web page

Which of the following best describes the SQL Power Injector tool?

Searches for execution path hooking, which allows a function value in an accessible environment to be changed

Which of the following best describes the heuristic or behavior-based detection method?

They test every possible valid combination

Which of the following best explains why brute force attacks are always successful?

Mixing personal and corporate data

Which of the following bring-your-own-device (BYOD) risks is both a security issue for an organization and a privacy issue for a BYOD user?

rooting or jailbreaking

Which of the following can void a mobile device's warranty, cause poor performance, or brick a mobile device (making it impossible to turn on or repair)?

Computation and storage

Which of the following cloud security controls includes backups, space availability, and continuity of services?

Diffie-Hellman

Which of the following cryptographic algorithms is used in asymmetric encryption?

Known plain text

Which of the following cryptography attacks is characterized by the attacker having access to both the plain text and the resulting ciphertext, but does not allow the attacker to choose the plain text?

A unique token that a server assigns for the duration of a client's communications with the server.

Which of the following describes a session ID?

The use of man-in-the-middle attacks, spoofing, and other attacks to take advantage of client-side vulnerabilities.

Which of the following describes the exploitation stage of the mobile device penetration testing process?

Spyware can monitor and log call histories, GPS locations, and text messages.

Which of the following describes the risks of spyware that are particular to mobile devices?

EFS

Which of the following encryption tools would prevent a user from reading a file that they did not create and does not require you to encrypt an entire drive?

Web servers provide an easily found, publicly accessible entrance to a network that users are encouraged to enter into and browse.

Which of the following explains why web servers are often targeted by attackers?

inability to detect the keep the state status

Which of the following firewall limitations is a critical vulnerability because it means that packet filters cannot tell whether a connection was started inside or outside the organization?

packet filtering

Which of the following firewall technologies operates at Layers 3 (Network) and 4 (Transport) of the OSI model?

service discovery

Which of the following footprinting methods would you use to scan a web server to find ports that the web server is using for various services?

Symmetric cryptography

Which of the following forms of cryptography is best suited for bulk encryption because of its speed?

Indicates that data has ended and a command is beginning.

Which of the following functions does a single quote (') perform in an SQL injection?

low-level

Which of the following honeypot interaction levels can't be compromised completely and is generally set to collect information about attacks like network probes and worms?

high-level

Which of the following honeypot interaction levels simulate all service and applications and can be completely compromised by attackers to get full access to the system in a controlled area?

Uses the Rijndael block cipher

Which of the following is a characteristic of the Advanced Encryption Standard (AES) symmetric block cipher?

OWASP

Which of the following is a nonprofit organization that provides tools and resources for web app security and is made up of software developers, engineers, and freelancers?

Brutus

Which of the following is a password cracking tool that can make over 50 simultaneous target connections?

honeypot

Which of the following is a physical or virtual network device set up to masquerade as a legitimate network resource?

BLE

Which of the following is a short-range wireless personal area network that supports low-power, long-use IoT needs?

New or unusual protocols and services running.

Which of the following is a sign of a network-based intrusion?

volumetric attack

Which of the following is an attack where all traffic is blocked by taking up all available bandwidth between the target computer and the Internet?

Registration authority

Which of the following is an entity that accepts and validates information contained within a request for a certificate?

OpenSSL

Which of the following is an open-source cryptography toolkit that implements SSL and TLS network protocols and the related cryptography standards required by them?

passive hijacking

Which of the following is characterized by an attacker using a sniffer to monitor traffic between a victim and a host?

Copying the key to a USB drive

Which of the following is considered an out-of-band distribution method for private key encryption?

Isolate the system from the network immediately

Which of the following is the first step you should take if malware is found on a system?

Ron's Cipher v4 (RC4)

Which of the following is the most frequently used symmetric key stream cipher?

Two

Which of the following is the number of keys used in asymmetric (public key) encryption?

One

Which of the following is the number of keys used in symmetric encryption?

ARP poisoning

Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on the network?

CAN-SPAM Act

Which of the following laws is designed to regulate emails?

Scareware

Which of the following malware types shows the user signs of potential harm that could occur if the user doesn't take a certain action?

Don't auto-upload photos to social networks.

Which of the following mobile security best practices for users is concerned with geotags?

Check for a cross-application-scripting error

Which of the following steps in an Android penetration test checks for a vulnerability hackers use to break down the browser's sandbox using infected JavaScript code?

session hijacking

Which of the following tasks is being described? 1. Sniff the traffic between the target computer and the server. 2. Monitor traffic with the goal of predicting the packet sequence numbers. 3. Desynchronize the current session. 4. Predict the session ID and take over the session. 5. Inject commands to target the server.

ciphertext

Which of the following terms is the encrypted form of a message that is unreadable except to its intended recipient?

Shark, PlugBot, and Poison Ivy

Which of the following tools can be used to create botnets?

Traffic IQ Professional

Which of the following tools enables security professionals to audit and validate the behavior of security devices?

bluesmacking

Which of the following types of Bluetooth hacking is a denial-of-service attack?

SMTP injection

Which of the following types of injections can be injected into conversations between an application and a server to generate excessive amounts of spam email?

website defacement

Which of the following types of web server attacks is characterized by altering or vandalizing a website's appearance in an attempt to humiliate, discredit, or annoy the victim?

Parabolic

Which of the following types of wireless antenna is shown in the image?

Logic bomb

Which of the following virus types is shown in the code below?

Install patches and updates

Which of the following web server countermeasures is implemented to fix known vulnerabilities, eliminate bugs, and improve performance?

man-in-the-middle

Which term describes the process of sniffing traffic between a user and server, then re-directing the traffic to the attacker's machine, where malicious traffic can be forwarded to either the user or server?

client-based web app

Which type of web application requires a separate application to be installed before you can use the app?

CCMP

You are a cybersecurity specialist. ACME, Inc. has hired you to install and configure their wireless network. As part of your installation, you have decided to use Wi-Fi Protected Access 2 (WPA2) security on all of your wireless access points. You want to ensure that the highest level of security is used. Which of the following encryption protocols should you use to provide the highest level of security?

The Host Name is what the users see in the list of available networks when they connect to the access point.

You are configuring a wireless access point and are presented with the image shown below. Which of the following is the most correct statement regarding the access point's configuration?

The SSID is a unique name, separate from the access point name.

You are configuring several wireless access points for your network. Knowing that each access point will have a service set identifier (SSID), you want to ensure that it is configured correctly. Which of the following SSID statements are true?

IaaS

You are employed by a small start-up company. The company is in a small office and has several remote employees. You must find a business service that will accommodate the current size of the company and scale up as the company grows. The service needs to provide adequate storage as well as additional computing power. Which of the following cloud service models should you use?

Netsparker

You are looking for a web application security tool that runs automated scans looking for vulnerabilities susceptible to SQL injection, cross-site scripting, and remote code injection. Which of the following web application security tools would you most likely use?

host-based IDS

You are on a Windows system. You receive an alert that a file named MyFile.txt.exe had been found. Which of the following could this indicate?

clear text passwords are shown

You are the cybersecurity specialist for your company and have been hired to perform a penetration test. You have been using Wireshark to capture and analyze packets. Knowing that HTTP POST data can sometimes be easy prey for hackers, you have used the http.request.method==POST Wireshark filter. The results of that filter are shown in the image. After analyzing the captured information, which of the following would be your biggest concern?

An end-to-end performance and load testing tool that can simulate up to 1 million users and makes realistic load tests easier.

You are using BlazeMeter to test cloud security. Which of the following best describes BlazeMeter?

there are multiple SYN packets with different source addresses

You are using Wireshark to try and determine if a denial-of-service (DDoS) attack is happening on your network (128.28.1.1). You previously captured packets using the tcp.flags.syn==1 and tcp.flags.ack==1 filter, but only saw a few SYN-ACK packets. You have now changed the filter to tcp.flags.syn==1 and tcp.flags.ack==0. After examining the Wireshark results shown in the image, which of the following is the best reason to conclude that a DDoS attack is happening?

firewalking

You are working on firewall evasion countermeasures and are specifically looking for a tool to expose TTL vulnerabilities. Which of the following tools would you use?

ACME, inc

You have been asked to perform a penetration test for a company to see if any sensitive information can be captured by a potential hacker. You have used Wireshark to capture a series of packets. Using the tcp contains Invoice filter, you have found one packet. Using the captured information shown, which of the following is the name of the company requesting payment?

St@y0ut!@

You have just captured the following packet using Wireshark and the filter shown. Which of the following is the captured password?

with the flood, all packets come from the same source IP address in quick succession

You suspect that an ICMP flood attack is taking place from time to time, so you have used Wireshark to capture packets using the tcp.flags.syn==1 filter. Initially, you saw an occasional SYN or ACK packet. After a short while, however, you started seeing packets as shown in the image. Using the information shown, which of the following explains the difference between normal ICMP (ping) requests and an ICMP flood?

Block

You work for a company that is implementing symmetric cryptography to process payment applications such as card transactions where personally identifiable information (PII) needs to be protected to prevent identity theft or fraudulent charges. Which of the following algorithm types would be best for transmitting large amounts of data?

A software-based access point.

You work for a very small company that has 12 employees. You have been asked to configure wireless access for them. Knowing that you have a very limited budget to work with, which of the following technologies should you use?

Chosen plain text

Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plain text to see the resulting ciphertext. Which of the following cryptographic attacks is being used?

session fixation

Your network administrator has set up training for all the users regarding clicking on links in emails or instant messages. Which of the following is your network administrator attempting to prevent?

sniffing

Your network administrator is configuring settings so the switch shuts down a port when the max number of MAC addresses is reached. What is the network administrator taking countermeasures against?

integrity RTOS and snappy

YuJin drove his smart car to the beach to fly his drone in search of ocean animal activity. Which of the following operation systems are most likely being used by his car and drone?


Ensembles d'études connexes

Common Ions in the Human Body and Their Physiologic Significance (Chapter 2)

View Set

Renal Nurse Labs AKI, CKD, and Dialysis

View Set