CIST 2613 Final review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What port does the Trivial File Transfer Protocol, or TFTP service use?

.port 69

In HTML, each tag has a matching closing tag that is written with which of the following characters?

/

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?

443

What type of encryption is currently used to secure WPA2?

AES

UNIX was first written in assembly language. However, it was soon rewritten in what programming language?

C

What professional level security certification requires five years of experience and is designed to focus on an applicant's security-related managerial skills?

CISSP

When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack" the company's network, they should proceed by performing what precautionary step?

Consult their lawyer

Which of the following describes a flexible program that automates a task that takes too much time to perform manually?

Custom Script

The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of which OSI model layer?

Data Link layer

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

Domain controller

What term best describes a person who hacks computer systems for political or social reasons?

Hactivist

Which type of device monitors a network's hardware so that security administrators can identify attacks in progress and stop them?

IDS

Which of the following is a common Linux rootkit?

Linux Rootkit 5 not

A device that performs more than one function, such as printing, and faxing is called which of the following?

MFD

Which of the following resources is an excellent starting point for security professionals when investigating VBScript vulnerabilities?

Microsoft Security Bulletin

What is the current file system that Windows utilizes that has strong security features?

NTFS

Which of the following is a Windows programming interface that allows computers to communicate across a local area network (LAN)?

NetBios

Which of the following is considered to be the most critical SQL vulnerability?

Null SA Password

What port does the Simple Mail Transfer Protocol, or SMTP service use?

Port 25

What port does the Hypertext Transfer Protocol, or HTTP service use?

Port 80

What organization disseminates research documents on the computer and network security worldwide at no cost?

SANS Institute

Which on of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely?

SNMP

What type of network attack relies on guessing a TCP header's initial sequence number, or ISN?

Session hijacking

What type of packet filtering records session-specific information about a network connection, including the ports a client uses?

Stateful Packet inspection

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

Stealth

What protocol is the most widely used and allows all computers on a network to communicate and function correctly?

TCP/IP

What version of Windows Server has completely eliminated the option for telnet server?

Windows Server 2016

When hackers drive around or investigate an area with an antenna, they are usually looking for which component of a wireless network?

access point

Which type of program can mitigate some risks associated with malware?

antivirus

What is the specific act of checking a user's privileges to understand if they should or should not have access to a page, field, resource, or action in an application?

authorization

What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters?

brute force

Carelessly reviewing your program's code might result in having which of the following in your program code?

bug

What type of system converts between plaintext and ciphertext?

crypyosystem

When an attacker has access to a password file, they can run a password-cracking program that uses a dictionary of known words or passwords as an input file. What type of attack is this attacker performing?

dictionary

Which of the following sits between the Internet and the internal network and is sometimes referred to as a perimeter network?

dmz

Which of the following is a computer placed on the network perimeter with the main goal of distracting hackers from attacking legitimate network resources?

honeypot

What is the specific act of filtering, rejecting, or sanitizing a user's untrusted input before the application processes it?

input validation

Which of the following commands is a powerful enumeration tool included with Windows?

nbtstat

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

network security

To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses?

ping sweep

Which of the following cross-site scripting vulnerabilities types relies on social engineering to trick a user into visiting a maliciously crafted link or URL?

reflected

Which of the following is a backdoor initiated from inside the target's network that makes it possible to take control of the target even when it's behind a firewall?

reverse shell

Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?

script

If an organization does not want to rely on a wireless device to authenticate users, which of the following is a secure alternative?

server

Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?

session hijacking

Which of the following is a backdoor initiated from inside the target's network that makes it possible to take control of the target even when it's behind a firewall?

stateful

What type of cryptography is demonstrated by reversing the alphabet, so A becomes Z, B becomes Y, and so on?

substitution cipher

Which of the following if often found within an embedded OS that can cause a potential vulnerability to an attack?

web server

Which type of virus is written as a list of commands that can be set automatically to run as soon as a computer user opens the file?

worm


Set pelajaran terkait

BUSINESS COMMUNICATION CARDON CH 9

View Set

Principles of Advertising CH. 9 Planning Media Strategy: Disseminating the Message

View Set

Biology: Quiz 2: BODY FRAMEWORK AND REPRODUCTION

View Set

FINAL FUNDAMENTALS (masterpiece)

View Set

Presidents: # 16 Abraham Lincoln, Rep., 1861-1865

View Set

13 - Lingua Latina - Familia Romana - Capitulum XIII

View Set