CEH 9

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is the structure designed to verify and authenticate the identity of individuals within the enterprise taking part in a data exchange? single sign on biometrics PKI SOA

PKI

During a blackbox pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic? Application Stateful Packet Filtering Circuit

Packet Filtering

This international organization regulates billions of transactions daily and provides security guidelines to protect personally identifiable information (PII). These security controls provide a baseline and prevent low-level hackers sometimes known as script kiddies from causing a data breach. Which of the following organizations is being described? Payment Card Industry (PCI) Center for Disease Control (CDC) International Security Industry Organization (ISIO) Institute of Electrical and Electronics Engineers (IEEE)

Payment Card Industry (PCI)

Your team has won a contract to infiltrate an organization. The company wants to have the attack be as realistic as possible; therefore, they did not provide any information besides the company name. What should be the first step in security testing the client? Reconnaissance Enumeration Escalation Scanning

Reconnaissance

It is an entity or event with the potential to adversely impact a system through unauthorized access, destruction, disclosure, denial of service or modification of data.Which of the following terms best matches the definition? Attack Threat Vulnerability Risk

Threat

You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line. Which command would you use? c:\ncpa.cpl c:\gpedit c:\services.msc c:\compmgmt.msc

c:\compmgmt.msc

Which of the following tools is used to analyze the files produced by several packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek? OpenVAS tcptrace tcptraceroute Nessus

tcptrace

The chance of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1 (100%). What is the closest approximate cost of this replacement and recovery operation per year? $440 $1320 $146 $100

$146

A common cryptographical tool is the use of XOR. XOR the following binary values: 10110001 00111010 11011000 10111100 10001011 10011101

10011101

You have successfully gained access to your client's internal network and succesfully comprised a linux server which is part of the internal IP network. You want to know which Microsoft Windows workstations have file sharing enabled. Which port would you see listening on these Windows machines in the network? 1433 445 161 3389

445

Which of the following is the greatest threat posed by backups? A backup is the source of Malware or illicit information. A backup is incomplete because no verification was performed An un-encrypted backup can be misplaced or stolen. A backup is unavailable during disaster recovery

A backup is unavailable during disaster recovery

You are using NMAP to resolve domain names into IP addresses for a ping sweep later. Which of the following commands looks for IP addresses? >host -t AXFR hackeddomain.com >host -t a hackeddomain.com >host -t ns hackeddomain.com >host -t soa hackeddomain.com

>host -t ns hackeddomain.com

A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated attacks, or host junk email content. Which sort of trojan infects this server? Turtle Trojans Ransomware Trojans Botnet Trojan Banking Trojans

Botnet Trojan

When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers manually to get more precise results than if using web vulnerability scanners. What proxy tool will help you find web vulnerabilities? Proxychains Burpsuite Maskgen Dimitry

Burpsuite

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim's profile to a text file and then submit the data to the attacker's database. <iframe src="http://www.vulnweb.com/updateif.php" style="display:none"></iframe> What is this type of attack (that can use either HTTP GET or HTTP POST) called? Cross-Site Request Forgery SQL Injection Browser Hacking Cross-Site Scripting

Cross-Site Request Forgery

Which of the following statements regarding ethical hacking is incorrect? Testing should be remotely performed offsite. Ethical hackers should never use tools or methods that have the potential of exploiting vulnerabilities in an organization's systems. An organization should use ethical hackers who do not sell vendor hardware/software or other consulting services. Ethical hacking should not involve writing to or modifying the target systems.

Ethical hackers should never use tools or methods that have the potential of exploiting vulnerabilities in an organization's systems.

You've just been hired to perform a pen test on an organization that has been subjected to a large-scale attack. The CIO is concerned with mitigating threats and vulnerabilities to totally eliminate risk. What is one of the first things you should do when given the job? Start the wireshark application to start sniffing network traffic. Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels. Establish attribution to suspected attackers Interview all employees in the company to rule out possible insider threats

Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels.

You work as a Security Analyst for a retail organization. In securing the company's network, you set up a firewall and an IDS. However, hackers are able to attack the network. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving? True Positive False Negative False Positive True Negative

False Positive

A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The ps command shows that the nc file is running as process, and the netstat command shows the nc process is listening on a network port. What kind of vulnerability must be present to make this remote attack possible? Privilege escalation Brute force login File system permissions Directory traversal

File system permissions

You have several plain-text firewall logs that you must review to evaluate network traffic. You know that in order to do fast, efficent searches of the logs you must use regular expressions. Which command-line utility are you most likely to use? Grep MS Excel Notepad Relational Database

Grep

Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company? Voice Fingerprints Iris patterns Height and Weight

Height and Weight

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", that the user is directed to a phishing site. Which file does the attacker need to modify? Networks Boot.ini Hosts Sudoers

Hosts

You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System. What is the best approach? Install and use Telnet to encrypt all outgoing traffic from this server. Use Alternate Data Streams to hide the outgoing packets from this server. Install Cryptcat and encrypt outgoing packets from this server. Use HTTP so that all traffic can be routed via a browser, thus evading the internal Intrusion Detection Systems.

Install and use Telnet to encrypt all outgoing traffic from this server.

Which of the following is assured by the use of a hash? Availability Integrity Confidentiality Authentication

Integrity

You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from this server will not be caught by a Network Based Intrusion Detection Systems (NIDS). What is the best way to evade the NIDS? Protocol Isolation Out of band signalling Encryption Alternate Data Streams

Encryption

You have successfully compromised a machine on the network and found a server that is alive on the same network. You tried to ping it but you didn't get any response back. What is happening? You need to run the ping command with root privileges. TCP/IP doesn't support ICMP. ICMP could be disabled on the target server. The ARP is disabled on the target server.

ICMP could be disabled on the target server.

During a security audit of IT processes, an IS auditor found that there were no documented security procedures. What should the IS auditor do? Identify and evaluate existing practices Conduct compliance testing Terminate the audit Create a procedures document

Identify and evaluate existing practices

Which of these options is the most secure procedure for storing backup tapes? On a different floor in the same building In a climate controlled facility offsite Inside the data center for faster retrieval in a fireproof safe In a cool dry environment

In a climate controlled facility offsite

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's email, and you send her an email changing the source email to her boss's email( boss@company ). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don't work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use? Social engineering Tailgating Piggybacking Eavesdropping

Piggybacking

Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization? Recovery phase Containment phase Preparation phase Identification phase

Preparation phase

The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE's Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the transport layer security (TLS) protocols defined in RFC6520. What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy? Private Shared Root Public

Private

PGP, SSL, and IKE are all examples of which type of cryptography? Digest Secret Key Public Key Hash Algorithm

Public Key

An Internet Service Provider (ISP) has a need to authenticate users connecting using analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network. Which AAA protocol is most likely able to handle this requirement? RADIUS DIAMETER Kerberos TACACS+

RADIUS

This asymmetry cipther is based on factoring the product of two large prime numbers. What cipher is described above? RC5 MD5 RSA SHA

RSA

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client. What is a possible source of this problem? The wireless client is not configured to use DHCP Client is configured for the wrong channel The client cannot see the SSID of the wireless network The WAP does not recognize the client's MAC address

The WAP does not recognize the client's MAC address

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up. What is the most likely cause? The network devices are not all synchronized. Proper chain of custody was not observed while collecting the logs. The attacker altered or erased events from the logs. The security breach was a false positive.

The attacker altered or erased events from the logs.

Which of the following is the BEST way to defend against network sniffing? Restrict Physical Access to Server Rooms hosting Critical Servers Using encryption protocols to secure network communications Register all machines MAC Address in a Centralized Database Use Static IP Address

Using encryption protocols to secure network communications

Which of the following is one of the most effective ways to prevent Cross-site Scripting (XSS) flaws in software applications? Validate and escape all information sent to a server Use digital certificates to authenticate a server prior to sending data Verify access right before allowing access to protected information and UI controls Use security policies and procedures to define and implement proper security settings

Validate and escape all information sent to a server

To maintain compliance with regulatory requirements, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such an audit? Vulnerability scanner Port scanner Protocol analyzer Intrusion Detection System

Vulnerability scanner

It is a short-range wireless communication technology intended to replace the cables connecting portable of fixed devices while maintaining high levels of security. It allows mobile phones, computers and other devices to connectand communicate using a short-range wireless connection. Which of the following terms best matches the definition? WLAN Radio-Frequency Identification Bluetooth InfraRed

WLAN

Initiating an attack against targeted businesses and organizations, threat actors compromise a carefully selected website by inserting an exploit resulting in malware infection. The attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. Aside from carefully choosing sites to compromise, these attacks are known to incorporate zero-day exploits that target unpatched vulnerabilities. Thus, the targeted entities are left with little or no defense against these exploits. What type of attack is outlined in the scenario? Heartbleed Attack Spear Phising Attack Shellshock Attack Watering Hole Attack

Watering Hole Attack

This phase will increase the odds of success in later phases of the penetration test. It is also the very first step in Information Gathering, and it will tell you what the "landscape" looks like. What is the most important phase of ethical hacking in which you need to spend a considerable amount of time? network mapping gaining access footprinting escalating privileges

footprinting

You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly. What is the best nmap command you will use? nmap -T4 -F 10.10.0.0/24 nmap -T4 -O 10.10.0.0/24 nmap -T4 -r 10.10.1.0/24 nmap -T4 -q 10.10.0.0/24

nmap -T4 -F 10.10.0.0/24

The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the central processing unit (CPU), rather than passing only the frames that the controller is intended to receive. Which of the following is being described? port forwarding WEM multi-cast mode promiscuous mode

port forwarding

When you are collecting information to perform a data analysis, Google commands are very useful to find sensitive information and files. These files may contain information about passwords, system functions, or documentation. What command will help you to search files using Google as a search engine? a.domain: target.com archive:xls username password email b.inurl: target.com filename:xls username password email c.site: target.com file:xls username password email d.site: target.com filetype:xls username password email

site: target.com filetype:xls username password email

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. What wireshark filter will show the connections from the snort machine to kiwi syslog machine? tcp.srcport==514 && ip.src==192.168.150 tcp.dstport==514 && ip.dst==192.168.0.99 tcp.dstport==514 && ip.dst==192.168.0.150 tcp.srcport==514 && ip.src==192.168.0.99

tcp.srcport==514 && ip.src==192.168.150

Which of the following is a command line packet analyzer similar to GUI-based Wireshark? tcpdump nessus Jack the ripper ethereal

tcpdump

Nation-state threat actors often discover vulnerabilities and hold on to them until they want to launch a sophisticated attack. The Sutxnet attack was an unprecedented style of attack because it used four types of vulnerability. What is this style of attack called? zero-sum zero-day zero-hour no-day

zero-day

Which of the following is a component of a risk assessment? Administrative safeguards DMZ Physical security Logical interface

Administrative safeguards

This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools. Which of the following tools is being described? Airguard Aircrack-ng WLAN-crack wificracker

Aircrack-ng

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ""FTP on the network!"";) A Router IPTable FTP Server rule A firewall IPTable An Intrusion Detection System

An Intrusion Detection System

A company's security policy states that all Web browsers must automatically delete their HTTP browser cookies upon terminating. What sort of security breach is this policy attempting to mitigate? Attempts by attackers to access Web sites that trust the Web browser user by stealing the user's authentication credentials. Attempts by attackers to determine the user's Web browser usage patterns, including when sites were visited and for how long. Attempts by attackers to access the user and password information stored in the company's SQL database. Attempts by attackers to access passwords stored on the user's computer without the user's knowledge.

Attempts by attackers to access Web sites that trust the Web browser user by stealing the user's authentication credentials.

Jimmy is standing outside a secure entrance to a facility. He is pretending to having a tense conversation on his cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it begins to close. What just happened? Tailgating Masqurading Phishing Whaling

Tailgating

Which of the following is not a Bluetooth attack? Bluesmacking Bluesnarfing Bluedriving Bluejacking

Bluedriving

You've gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your tool kit you have an Ubuntu 9.10 Linux LiveCD. Which Linux based tool has the ability to change any user's password or to activate disabled Windows accounts? John the Ripper Cain & Abel CHNTPW SET

CHNTPW

What is a "Collision attack" in cryptography? Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key. Collision attacks try to break the hash into three parts to get the plaintext value. Collision attacks try to find two inputs producing the same hash. Collision attacks try to get the public key

Collision attacks try to find two inputs producing the same hash.

A company's Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application. What kind of Web application vulnerability likely exists in their software? Cross-site scripting vulnerability Cross-site Request Forgery vulnerability Session management vulnerability SQL injection vulnerability

Cross-site scripting vulnerability

While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place. What Web browser-based security vulnerability was exploited to compromise the user? Cross-Site Request Forgery Cross-Site Scripting Web form input validation Clickjacking

Cross-Site Request Forgery

The "black box testing" methodology enforces which kind of restriction? Only the external operation of a system is accessible to the tester. The internal operation of a system is completely known to the tester. Only the internal operation of a system is known to the tester. The internal operation of a system is only partly accessible to the tester.

Only the external operation of a system is accessible to the tester.

Perspective clients want to see sample reports from previous penetration tests. What should you do next? Decline, just provide the details of the components that will be there in the report. Share sample reports with redactions after NDA is signed. Share full reports, not redacted. Decline, just provide references.

Decline, just provide references.

A medium-sized healthcare IT business decides to implement a risk management strategy. Which of the following is NOT one of the five basic responses to risk? Accept Mitigate Delegate Avoid

Delegate

env x=`(){ :;};echo exploit` bash -c 'cat /etc/passwd' What is the Shellshock bash vulnerability attempting to do on an vulnerable Linux host? Changes all passwords in passwd Display passwd content to prompt Add new user to the passwd file Removes the passwd file

Display passwd content to prompt

After trying multiple exploits, you've gained root access to a Centos 6 server. To ensure you maintain access, what would you do first? Disable IPTables Create User Account Download and Install Netcat Disable Key Services

Download and Install Netcat

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN? AH permiscuous ESP tranport mode AH Tunnel mode ESP confidential

ESP tranport mode

When you return to your desk after a lunch break, you notice a strange email in your inbox. The sender is someone you did business with recently, but the subject line has strange characters in it. What should you do? Forward the message to your supervisor and ask for her opinion on how to handle the situation. Delete the email and pretend nothing happened. Reply to the sender and ask them for more information about the message contents. Forward the message to your company's security response team and permanently delete the message from your computer.

Forward the message to your company's security response team and permanently delete the message from your computer.

To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program. What term is commonly used when referring to this type of testing? Mutating Fuzzing Bounding Randomizing

Fuzzing

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive? Vulnerability scanner Protocol analyzer Intrusion Prevention System (IPS) Network sniffer

Intrusion Prevention System (IPS)

What is the best description of SQL Injection? It is an attack used to modify code in an application. It is a Denial of Service Attack. It is an attack used to gain unauthorized access to a database. It is a Man-in-the-Middle attack between your SQL Server and Web App Server.

It is an attack used to gain unauthorized access to a database.

You are performing information gathering for an important penetration test. You have found pdf, doc, and images in your objective. You decide to extract metadata from these files and analyze it. What tool will help you with the task? Metagoofil cdpsnarf Dimitry Armitage

Metagoofil

A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server. Based on this information, what should be one of your key recommendations to the bank? Require all employees to change their anti-virus program with a new one Issue new certificates to the web servers from the root certificate authority Move the financial data to another server on the same IP subnet Place a front-end web server in a demilitarized zone that only handles external web traffic

Move the financial data to another server on the same IP subnet

Which of the following describes the characteristics of a Boot Sector Virus? Modifies directory table entries so that directory entries point to the virus code instead of the actual program Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR Overwrites the original MBR and only executes the new virus code Moves the MBR to another location on the RAM and copies itself to the original location of the MBR

Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR

Using Windows CMD, how would an attacker list all the shares to which the current user context has access? NET USE NET FILE NET VIEW NET CONFIG

NET VIEW

Which regulation defines security and privacy controls for Federal information systems and organizations? NIST-800-53 EU Safe Harbor HIPAA PCI-DSS

NIST-800-53

The network administrator contacts you and tells you that she noticed the temperature on the internal wireless router increases by more than 20% during weekend hours when the office was closed. She asks you to investigate the issue because she is busy dealing with a big conference and she doesn't have time to perform the task. What tool can you use to view the network traffic being sent and received by the wireless router? Wireshark Netcat Nessus Netstat

Netstat

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform? Netstumbler Kismet Nessus Abel

Netstumbler

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs? Nikto Snort Dsniff John the Ripper

Nikto

You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through. invictus@victim_server:~$ nmap -T4 -O 10.10.0.0/24 TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxx. QUITTING! What seems to be wrong? OS Scan requires root privileges. The nmap syntax is wrong. This is a common behavior for a corrupted nmap application. The outgoing TCP/IP fingerprinting is blocked by the host firewall.

OS Scan requires root privileges.

It is a kind of malware (malicious software) that criminals install on your computer so they can lock it from a remote location. This malware generates a pop-up window, webpage, or email warning from what looks like an official authority. It explains that your computer has been locked because of possible illegal activities on it and demands payment before you can access your files and programs again. Which of the following terms best matches the definition? Ransomware Spyware Riskware Adware

Ransomware

You are performing a penetration test. You achieved access via a buffer overflow exploit and you proceed to find interesting data, such as files with usernames and passwords. You find a hidden folder that has the administrator's bank account password and login information for the administrator's bitcoin account. What should you do? Report immediatly to the administrator Do not report it and continue the penetration test Transfer money from the administrator's account to another account Do not transfer the money but steal the bitcoins

Report immediatly to the administrator

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed? Impact risk Inherent risk Deferred risk Residual risk

Residual risk

Which of the following security operations is used for determining the attack surface of an organization? Using configuration management to determine when and where to apply security patches Running a network scan to detect network services in the corporate DMZ Reviewing the need for a security clearance for each employee Training employees on the security policy regarding social engineering

Running a network scan to detect network services in the corporate DMZ

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing. What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester? Non-Disclosure Agreement Project Scope Service Level Agreement Rules of Engagement

Service Level Agreement

It is a vulnerability in GNU's bash shell, discovered in September of 2014, that gives attackers access to run remote commands on a vulnerable system. The malicious software can take control of an infected machine, launch denial-of-service attacks to disrupt websites, and scan for other vulnerable devices (including routers). Which of the following vulnerabilities is being described? Shellshock Rootshell Shellbash Rootshock

Shellshock

Which of the following is a low-tech way of gaining unauthorized access to systems? Social Engineering Eavesdropping Sniffing Scanning

Social Engineering

Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Ricardo using? RSA algorithm Encryption Steganography Public-key cryptography

Steganography

You are attempting to man-in-the-middle a session. Which protocol will allow you to guess a sequence number? UPD TCP UPX ICMP

TCP

Which of the following is the successor of SSL? IPSec RSA TLS GRE

TLS

A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS? Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan report for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 80/tcp open http 139/tcp open netbios-ssn 515/tcp open 631/tcp open ipp 9100/tcp open MAC Address: 00:00:48:0D:EE:8 The host is likely a printer. The host is likely a Linux machine. The host is likely a router. The host is likely a Windows machine.

The host is likely a printer.

The "white box testing" methodology enforces what kind of restriction? The internal operation of a system is only partly accessible to the tester. Only the internal operation of a system is known to the tester. Only the external operation of a system is accessible to the tester. The internal operation of a system is completely known to the tester.

The internal operation of a system is completely known to the tester.

The "gray box testing" methodology enforces what kind of restriction? The internal operation of a system is only partly accessible to the tester. Only the external operation of a system is accessible to the tester. The internal operation of a system is completely known to the tester. Only the internal operation of a system is known to the tester.

The internal operation of a system is only partly accessible to the tester.

Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system. If a scanned port is open, what happens? The port will send a SYN The port will send an RST The port will send an ACK The port will ignore the packets

The port will ignore the packets

Risks = Threats x Vulnerabilities is referred to as the: BIA equation Threat assessment Disaster recovery formula Risk equation

Threat assessment

What is the most common method to exploit the "Bash Bug" or "ShellShock" vulnerability? SSH Manipulate format strings in text fields SYN Flood Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server

Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server

What does a firewall check to prevent particular ports and applications from getting packets into an organization? Network layer headers and the session layer port numbers Application layer port numbers and the transport layer headers Transport layer port numbers and application layer headers Presentation layer headers and the session layer port numbers

Transport layer port numbers and application layer headers

Your company was hired by a small healthcare provider to perform a technical assessment on the network. What is the best approach for discovering vulnerabilities on a Windows-based computer? Use the built-in Windows Update tool Create a disk image of a clean Windows installation Use a scan tool like Nessus Check MITRE.org for the latest list of CVE findings

Use a scan tool like Nessus

Which of the following is considered the best way to protect Personally Identifiable Information (PII) from Web application vulnerabilities? Use full disk encryption on all hard drives to protect PII Use encrypted communications protocols to transmit PII Store all PII in encrypted format Use a security token to log into all Web applications that use PII

Use encrypted communications protocols to transmit PII

While using your bank's online servicing you notice the following string in the URL bar: "http://www.MyPersonalBank.com/account?id=368940911028389&Damount=10980&Camount=21" You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflect the changes. Which type of vulnerability is present on this site? SQL injection Web Parameter Tampering Cookie Tampering XSS Reflection

Web Parameter Tampering

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, smallsized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks? Burp Whisker Hydra tcpsplice

Whisker

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving. Which Algorithm is this referring to? Wi-Fi Protected Access (WPA) Temporal Key Integrity Protocol (TKIP) Wi-Fi Protected Access 2 (WPA2) Wired Equivalent Privacy (WEP)

Wired Equivalent Privacy (WEP)

The purpose of a __________ is to deny network access to local area networks and other information assets by unauthorized wireless devices. Wireless Access Control List Wireless Access Point Wireless Jammer Wireless Analyzer

Wireless Jammer


Set pelajaran terkait

Asesmen psikologi - Skala pengukuran

View Set

Defense Mechanisms: Stress, Health, and Sleep

View Set

Medical Terminology Module 4 (for Final)

View Set