study terms for class
Which of the following is the Nmap command-line switch for a full connect port scan?
-sT
This range of ports are registered ports that have been identified as usable by other applications. .
1025- 49151
Which of the following is a flag on a packet? (Choose all that apply)
ACK PSH SYN
Which of the following statements is most correct?
Active fingerprinting tools inject packets into the network.
Hackers may justify their actions based on which of the following: (Choose all that apply)
All information should be free. Access to computers and their data should be unlimited. Writing viruses, malware, or other code is not a crime.
What is the difference between an intrusion detection system and an intrusion prevention system?
An intrusion prevention system can block traffic.
This portion of the Triad determines whether information or services are available to the user when they are expected to be.
Availability
What is an essential process to the survival of operations?
Backups
This is designed to determine information about services running on a system?
Banner grabbing
A hacker with computing skills and expertise to launch harmful attacks on computer networks and who uses those skills illegally is best described as a(n):
Black-Hat Hacker
How are brute-force attacks performed?
By trying all possible combinations of characters
Which of the following are typically Web resources used to footprint a company? (Choose all that apply)
Company Web site Job search sites Internet Archive
This portion of the Triad means making sure no one gets unauthorized access to information.
Confidentiality
The hacking methodology when they attempt to remove evidence of their presence is?
Cover Tracks
This SMTP command can return all the users on a distribution list:
EXPN
If you were looking for information about a company's financial history, you would want to check the ________ database.
Edgar
This hacking methodology refers to where you extract much more detailed information?
Enumeration
This phase is a high-risk process.
Enumeration
When hackers talk about standards of behavior and moral issues of right and wrong, what are they referring to?
Ethics
An attacker who can guess the strings and use them to extract usernames will use this technique
Exploiting SNMP
What is a common potential downside to running a vulnerability scan?
False positives
By trying all possible combinations of characters
File shares Printer sharing group information usernames
To block network traffic based on sets of rules works with what device?
Firewall
This hacking methodology refers to using primarily passive methods of gaining information from a target?
Footprinting
________ is a popular NMAP option though easily detectable scanning technique.
Full connect
The MAC address uses what type of coding?
Hexadecimal
Which topology is the most common today?
Hybrid
This group is responsible for managing IP addresses, ports, protocols, and other essential numbers associated with the functioning of the Internet.
IANA
This portion of the Triad is that we expect the same data to be intact when we retrieve it again.
Integrity
What type of device would you use the web site Shodan for?
Internet of things devices
This protocol is very widely used due to the fact that it is an open standard that is used by a number of vendors in their own products—
LDAP
Information that may be obtained during a NULL session includes: (Choose all that apply)
List of users and groups list of machines users and host SIDS list of shares
Both Unix/Linux and Windows systems offer the ability to enable and configure _______.
Logging
Which of the following is used to perform network scans
NMAP
What are some of the common vulnerabilities of Windows? (Choose all that apply)
Needs patchs Passwords are weak points Firewall can be disabled
At which layer of the OSI model does a router function?
Network
The process of determining the underlying version of the system program being used is best described as ________.
OS fingerprinting
Footprinting can determine which of the following? (Choose all that apply)
Organization information employee names Operating system information
At a very basic level, a firewall is a _______ ________.
Packet filter
What is the best description of footpriniting
Passive information gathering
________ involves increasing access on a system.
Privilege escalation
This is a set of Microsoft tools designed to extract various kinds of information
PsTools suite
For GHDB Google hacking the command "allintitle" finds?
Returns pages with specific keywords.
Which of the following is the best example of passive information gathering?
Reviewing job listings posted by the targeted company
The individual responsible for releasing what is considered to be the first Internet worm was:
Robert T. Morris Jr.
A ________ is a file used in Microsoft operating systems to store passwords.
SAM
________ is an Application layer protocol that can operate over different protocols at lower layers
SMB
Port 161 is associated with which commonly used protocol or service?
SNMP
SNMP systems has which two components running: (Choose two)
SNMP agent SNMP management station
Which of the following describes an attacker who is not aware of how the software they downloaded will work?
Script Kiddie
How is the practice of tricking employees into revealing sensitive data about their computer system or infrastructure best described?
Social Engineering
Which devices can run at layer 2 of the OSI model? (Choose all that apply)
Switch Bridge
This service is a natural and easy target for many attackers through which port.
TCP 137
This term is used on a system or resource that is being evaluated for vulnerabilities.
TOE (Target of Evaluation)
How does a SYN scan differ from a full connect scan?
The SYN scan only gets to a half-open state
There are two meanings for the term security standard. (Choose two)
There are sets of standards that provide guidance for organizations The standards are managed by standards bodies
While these firewalls also inspect the packet, they commonly are specific to a particular protocol.
This firewall makes decisions based on the ports and addresses
What is the purpose of a security policy?
To provide high level statements of intent toward the security objectives and requirements of an organization.
You need to determine the path to a specific IP address. Which of the following tools is the best to use?
Tracert
An XMAS tree scan sets which of the following flags? (Choose all that apply)
URG FIN PSH
What is Google Hacking?
Using keywords in Google to narrow a search
This command is designed to return information about a user on a given system.
finger
Which OS tends to have a smallest attack surface?
linux
This Linux command lists and identifies the shared directories
showmount