Computer Security Final Exam Review Questions (Multiple Choice)
Which directory contains vital information about processes running on the Linux command system?
/proc
Wi-Fi is a trademark, owned by the Wi-Fi alliance, that is used to brand wireless technologies that conform to the _______ standard
802.11
Which standard combines the best of both 802.11a and 802.11b?
802.11g
Which of the following is a form of OS fingerprinting that involves actively requesting information from a target system?
Active fingerprinting
In what type of attack does the attacker take over an established session between two parties and then interacts with the remaining party as if the attacker were the party that has been disconnected?
Active session hijacking
What type of sniffing takes place on networks that have connectivity hardware that is "smarter" or more advanced, such as those with a switch?
Active sniffing
Which protocol resolves an Internet Protocol v4 (IPv4) address to an unknown Media Access Control (MAC) Address?
Address Resolution Protocol (ARP)
Which type of penetration test is designed to find loopholes or shortcomings in how tasks and operational processes are performed?
Administrative attack
Which term refers to the process of positively identifying a party as a user, computer, or service?
Authentication
Which of the following types of authentication is based on behavioral or physiological characteristic that is unique to an individual?
Biometrics
Which technology was designed to be a short-range networking technology (up to 10 meters) that could connect different devices together?
Bluetooth
Which of the following is NOT one of the more common distributions of Linux?
Cinnamon
Which of the following lock types are smart and programmable?
Cipher
Which of the following statements is NOT true regarding information in a public company?
Companies should attempt to keep all information secret
Which type of token does NOT require that the card be inserted or slid through a reader?
Contactless
What type of attack relies on a variation of the input validation attack but has the goal of going after a user instead of the application or data?
Cross-site scripting (XXS)
Which of the following is a structured format for storing information for later retrieval, modification, management, and other purposes?
Database
Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a password that is a word or a name?
Dictionary Password attack
Which of the following is NOT considered one of the three types of controls you can use to mitigate risk?
Distribution
What is the most common type of network, which is also referred to as IEEE 802.3?
Ethernet
Which of the following statements is true regarding ethical hackers?
Ethical hackers engage in their activities only with the permission of the asset owner
Which of the following is a disadvantage of alarms?
False alarms tied to the police may result in fines
From a security standpoint, which of the following is NOT desirable in a door?
Hollow core
Which of the following is true of IPv6?
IPv6 addresses are 128 bit numbers
Which of the following is NOT a common use of live Linux distributions?
Increasing random access memory (RAM) on a system
Which of the following is a type is the first step an attacker must perform to conduct a session hijacking?
Insert himself/herself between Party A and Party B
Which term refers to the ability to verify that information has not been altered and has remained in the form originally intended by the creator?
Integrity
Which of the following is NOT considered a readily available source of financial information on publicly U.S. companies?
Internet Assigned Numbers Authority (IANA)
Which of the following is NOT true of lighting?
It is one of the highest-cost security controls that can be implemented by an organization
Which statement is NOT true of Kali Linux?
Kali is designed to be used as a desktop replacement operating system
Which of the following statements is NOT true of Linux?
Linux runs on a limited range of hardware
Which web session vulnerability is directly associated with sessions that remain valid for periods longer than they are needed?
Long-lived sessions
Common database vulnerabilities include the following except ________.
Many audit log settings
Which of the following types of viruses infect using multiple attack vectors, including the boot sector and executable files on a hard drive?
Multipartite virus
Which term refers to the ability to ensure that a message originated from a specific party?
Nonrepudidation
______refers to a program to query Internet domain name servers
Nslookup
The practice of identifying the operating system of a networked device through either passive or active techniques is called_____
OS fingerprinting
Which of the following is a method of identifying the Os of a targeted computer or device in which no traffic or packets are injected in the network? Attackers simply listen to and analyze existing traffic
Passive fingerprinting
Which of the following is NOT true regarding passive sniffing?
Passive sniffing works only when the traffic you wish to observe and the station that will do the sniffing are in different collision domains
Which of the following refers to the structured and methodical means of investigating, uncovering, attacking, and reporting on a target system's strengths and vulnerabilities?
Penetration testing
Repeaters, hubs, bridges, and switches are typically part of which layer of the TCP/IP model?
Physical or Network Access Layer
Which of the following types of viruses are designed to change its code and "shape" to avoid detection by virus scanners?
Polymorphic virus
Which of the following is NOT considered a vulnerability of web servers?
Poor end-user training
Which of the following is NOT a countermeasure to threats against wireless LANs?
Promiscuous clients
What provides a framework through which two parties can establish a trusted relationship even if the parties have no prior knowledge of one another?
Public Key Infrastructure (PKI)
Which of the following is a type of malware designed to hold your data hostage?
Ransomware
Which of the following is NOT on the Internet sources that hackers use to gather information about a company's employees?
Regional internet registries
______ refers to software designed to alter system files and utilities on a victim's system with the intention of changing the way a system behaves.
Rootkit
Which user account gets nearly unlimited access to the local system and can perform actions on the local system with little or no restriction?
SYSTEM
Which of the following is primarily concerned with the security of the web server because it can provide an easy means of getting into the local network?
Server administrator
Which of the following uniquely identifies a wireless network, thereby ensuring that clients can locate the correct wireless local area network (WLAN) they should be attaching to?
Service set identifier (SSID)
Which of the following is NOT a step in planning an attack on a target?
Set up a deny all access control to block all traffic to all ports unless such traffic has been explicitly approved
Which type of TCP scan is the most reliable but also the easiest to detect?
TCP connect scan
Which type of penetration testing is designed to simulate an attack against technology from either the inside or the outside depending on the goals and intentions of the client?
Technical attack
Which of the following laws was originally passed to address federal computer-related offenses and the cracking of computer systems?
The Computer Fraud and Abuse Act of 1986
Which two protocols are associated with the Transport Layer of the OSI Reference Model?
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
What is a mechanism used to encrypt communication between two parties?
Transport Layer Security (TLS)
Which of the following is a type of malware that looks legitimate but hides a payload that something unwanted?
Trojan
Which of the following types of malware is a piece of code or software that spreads from system to system by attaching itself to other files, and is activated when the file accessed?
Virus
Which of the following allows the placing of telephone calls over computer networks and the internet?
Voice over IP (VoIP)
________is a techinque that has existed for more than 25 years as a footprinting tool and involves the use of modems
Wardialing
What is the process of locating wireless access points and gaining information about the configuration of each?
Wardriving and related activities
Which of the following is directly associated with encryption using short keys or keys that are poorly designed and implemented?
Weak ciphers or encoding algorithms
________ refers to the software designed to query databases to look up and identify the registrant of a domain name
Whois
The IEEE 802.11 family of standards, which include 802.11g, 802.11n, and 802.11ac, is known collectively in standard jargon as________.
Wi-Fi
Which of the following offers the greatest level of security for wireless networks?
Wi-Fi Protected Access 2 (WPA2)
Which of the following is a malware program designed to replicate without attaching to or infecting other files on a host system?
Worm
Automated methods for obtaining registrar network range information for a company ________.
are faster than manual methods
Offloading services from the local intranet to the Internet itself can be done by using _______.
cloud computing
A major difference between a malicious hacker and an ethical hacker is the
code of ethics to which each subscribes
Attackers' attempts to stop their tracks from being detected are referred to as _________.
covering tracks
Which of the following Linux commands copies files from location to location?
cp
Consumption bandwidth, consumption of resources, and exploitation of programming defects are the three broad categories of _______.
denial of service attacks
During the planning phase of a penetration test, the aim should be to...
determine why a penetration test and its associated tasks are necessary
When performing a penetration test, the team should generally include members with
different but complementary skills
An attacker can deprive the system owner of the ability to detect the activities that have been carried out by _____.
disabling auditing
All of the following actions can be helpful in thwarting session hijacking attacks except _______.
employing operating systems that create predictable sets of sequence numbers
Bits that are set in the header of a packet, each describing a specific behavior, are called _____
flags
The main function or capability of certificate authorities is to...
generate key pairs and bind a user's identity to the public key
Denial of service and Distributed denial of service attacks have the same effect. However, a DDoS attack ________.
is launched from large numbers of hosts that have been compromised
The core component of the Linux operating system, which has control over all low-level system functions such as resource management, input and output operations, and central processing unit (CPU), is called the _______.
kernel
Media Acces Control (MAC) flooding and Address Resolution Protocol (ARP) poisoning are _________.
methods of bypassing a switch to perform sniffing
Which command creates new directories in Linux?
mkdir
The 802.11n standard can transmit multiple signals across multiple antennas. This method of transmitting signals is called _________.
multiple input and multiple output (MIMO)
Which Linux command moves files from one location to a new location?
mv
Shoulder surfing and social engineering are considered_________.
nontechnical password attacks
Botnets are used to perform all of the following attacks EXCEPT:
passive session hijacking
Privilege escalation gives the attacker the ability to ______
perform actions on a system with fewer restrictions and perform tasks that are potentially more damaging
Digital certificates...
provide a form of identification on the Internet and in other areas
Which command displays the current location of the user within the Linux directory structure?
pwd
A one-way hashing function is designed to be
relatively easy to compute one way, but hard to undo or reverse.
Trojans perform the following operations except ______.
replicating
The unique ID assigned to each user account in Windows that identifies the account of group is called a _____?
security identifier
Facebook, LinkedIn, and Twitter are ______ sites
social media
The database on the local Windows system that is used to store user account information is called _____.
the Security Account Manager (SAM)
Cryptography provides all the following except
the ability into systems and remain undetected
An item that is present in wireless networks but not in wired networks is
the access point (AP)
Which of the following statements is NOT true regarding distributed denial of service (DDoS) attacks?
the attack is easily tracked back to its true source
A packet flagged with the FIN flag signals
the end or clearing of a connection.
Active@ and Trinity Rescue Kit are examples of:
tools used to change passwords.
