Ethical Hacking Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What formatting character can be used in combination with the printf command in Perl to format a floating-point number in scientific notation?

%e

Which of the following logical operators in the C programming language is evaluated as true if both sides of the operator are true?

&&

Which of the following correctly illustrates a comment in the C language?

/* This is a comment */

NetBios is not available in Windows Vista, Server 2008, and later versions of Windows. However, NetBios should be understood by a security professional because it is used for which of the following?

Backward compatibility

Which of the following takes you from one area of a program (a function) to another area?

Branching

What tool included with Kali Linux allows you to intercept traffic between the web browser and the server so you can inspect and manipulate requests before sending them to the server?

Burp Suite

Which of the following is not a best practice in regards to password policies?

Common words

Which of the following is not an essential component of a wireless network?

Firewall

Which of the following is a markup language rather than a programming language?

HTML

Which of the following would likely cause a syntax error in Python?

Inconsistent spacing.

Which of the following is a Python syntax rule?

Insert the def keyword in front of the function's name when creating a function.

Which of the following is a common Linux rootkit?

Linux Rootkit 5

Which of the following defines how data is placed on a carrier signal?

Modulation

A security analyst is reviewing assembly code in memory. Early Windows OSs used which of the following programs to interact with a network resource or device?

NetBIOS

Which of the following is considered to be the most critical SQL vulnerability?

Null SA password

Which of the following interfaces is a standard database access method, developed by SQL Access Group, that allows an application to access data stored in a database management system (DBMS)?

ODBC

There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people in the facility. What is one of these methods?

Paint the walls with a special paint that prevents radio-wave leakage.

What programming language emphasizes code readability and uses indentation to define blocks of code?

Python

What is the 1 to 32 character configurable name used to identify a WLAN?

SSID

When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?

Share-level security

To keep attackers from knowing the directory structure you create on an IIS web server, an individual should create what?

Virtual directory

How does the Wapiti vulnerability scanner work?

Wapiti uses two methods when scanning: "fuzzing" and searching for known vulnerabilities.

What configuration weakness did the botnet worm psyb0t target?

Weak passwords

What wireless hacking tool can perform scans for wireless access points and can set up fake APs to social-engineer users or confuse attackers using airbase-ng?

WiFi Pineapple

Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?

Windows CE

Which of the following is a software flaw that would cause billions of embedded systems to suddenly stop or fail when the clock struck midnight on the eve of the past millennium?

Y2K

To make it more difficult for wardrivers to discover your WLAN, you can use what?

airbase-ng

A vulnerability manager shows a report on Debian applications which are susceptible to a buffer overflow attack. What command will update and manage their RPM packages?

apt-get

Which of the following terms is the rate at which a sound wave repeats?

frequency

Which type of vulnerabilities can result from a server accepting untrusted, unvalidated input?

injection

What is the specific act of filtering, rejecting, or sanitizing a user's untrusted input before the application processes it?

input validation

In 802.1X, what component refers specifically to the wireless user attempting access to a WLAN?

supplicant


Set pelajaran terkait

Types of Individual Life Insurance 1

View Set

EMT - Chapter 34: Pediatric Emergencies

View Set

New words start with the letter A + B

View Set

PSY McGraw-Hill CH.13: Social Psychology

View Set

major characteristics of the somatic sensory and motor pathways

View Set