Chapter 3 & 4 Ethical Hacking
Which type of program can mitigate some risks associated with malware?
antivirus
What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?
Keyloggers
Which tool can be used to gather competitive intelligence from Web sites?
Metis
Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?
Network security
Which HTTP method requests that the entity is stored under the Request-URI?
PUT
Which HTTP method starts a remote Application-layer loopback of the request message?
TRACE
What 1-pixel x 1-pixel image file is referenced in an tag, and usually works with a cookie to collect information about the person visiting the Website?
Web bug
Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?
heuristics
To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?
nc -h
Which type of social engineering attack attempts to discover personal information through the use of email?
phishing
Which of the following is created after an attack and usually hides within the OS tools, so it is almost impossible to detect?
rootkit
Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?
signatures
A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?
social engineering
When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?
spear phishing
Which HTTP method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL)?
CONNECT