Ethical Hacking Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which file below, located in a user's home directory, holds a list of recently executed commands on Linux

.bash_history

The Windows .SCR format is actually a specialized form of what?

.exe

Where, by default, will screenshots taken by the root user on a Kali system be stored?

/root/Pictures

Where does Kali store video screen captures for the root user

/root/Videos

Which commonly installed software can sometimes be abused to aid in pivoting

All of the above

Which feature(s) of organizational culutre would be useful to know when creating social engineering attacks?

All of the above

Which of the following methods might a social engineer use to improve the effectiveness of their attack?

All of the above

Which of these might be a good place to look for plaintext passwords that could be usable for privilege escalation

All of the above

Which of the following should be avoided when briefing executives

All of the above should be avoided when briefing executives

What feature is most likely to make a phishing e-mail more believable

Appropriate branding for the company being targeted

Which of the following is closest to machine language

Assembly Language

What might be an issue with removing logs from a server

Both A and B

Where does a program store the data it is actively using?

Both A and B

Why might you want to make a backdoor that doesn't include persistence mechanisms?

Both A and B

Which of the attacks below can occur when the user can control some object or value before the program can use it

Both A and C

Why do social engineers often use time pressure as part of an attack

Both B and D

Which of the following Linux commands will immediately clear the history of the current user

Both a and C

Which of the following Windows commands will help you find the devices this device has recently connected to?

Both a and C

Which of these is not one of the OWASP top 10

Client-side scripting

What is the difference between a compiled language and an interpreted language

Compiled languages are translated to machine language by a compiler, and interpreted languages are read by an interpreter which executes its own code to interpret the meaning of the code

Which of these programs is a thick client application with a polished user interface, commercial-quality exploits, and built-in reporting features?

Core impact

The values A, B, C, and D are pushed onto the stack, in that order. When a pop command is issued, which value will be retrieved from the stack first

D - Last in first out

Why might you want to use a tool like DNSenum rather than directly scanning all IPs with NMAP?

DNSenum can be quieter than active scanning with NMAP

What does the Windows command auditpol /clear do?

Deletes audit policies applied to a user

Which of the following is the common term for going through an organization's trash looking for useful information?

Dumpster diving

What is the EAX register used for

EAX is a general purpose register and can hold anything, but most commonly holds intermediate data for math functions

What is the term which means "to increase the level of access the hacker has to the system"

Escalation of privilige

Which of these proxies is not included in Kali Linux?

Fiddler

What term is means "to gain command line access to a system"

Getting a shell

What is the EBP register used for

It points to the beginning of the current program's data on the stack

What is the ESP register used for?

It points to the top of the stack - point stacker

Of the items below, whcih would be most likely to be included in an executive summary section of the penetration test report

It was possible to extract the entire customer list using a SQL injection vulnerability on the public web site

What does DEP do

Lets the developer mark regions of memory as executable or non-executable, and will not execute commands placed in non-executable memory segments

What does MITM stand for?

Man in The Middle

Which of these sites offers a "what is this site running" feature which can help identify web servers and application frameworks in use on a web site?

Netcraft.com

Which of the following is not a notetaking app included in Kali

Notepad++

Which of the following is normally considered to be outside the scope of a penetration testing engagement, and may even be considered a conflict of interest

Offering to perform remediation of issues found

How should slides best be organized in the presentation

Order the slides to make it easy to match them to sections in the report

What is the difference between phishing and spear phishing

Phishing targets many people while spear phishing targets individuals or select groups

Which of the following includes creating a believable persona and a reason for being at the client's site?

Pretexting

What does ASLR do

Randomizes the location of programs in memory

In patching vulnerability MS14-025 what did many system admnistrators fail to do which led to ongoing vulnerability

Remove weakly protected credentials which had already been placed in the SYSVOL share

What command can be used from within Kali to search a local copy of the exploit-db

Searchsploit

A default install of a web application which includes unnecessary features enabled and default user accounts is an example of which OWASP top 10 item

Security Misconfiguration

Which of these is an example of a specialized search engine used to search for things like HTTP headers rather than web page content?

Shodan.io

Which of the following typically takes more time and research per subject

Spear phishing

What was Microsoft trying to protect users from, when it accidentally made all system memory (including kernel memory) readable and writable to all processes on the system

Spectre/Meltdown

What is a name for mapping a web site by visiting each link in the home page, then each link in every page that links to, and every link in every page that links to, etc.?

Spidering

A _____ cipher is used to perform bit-by-bit encryption of the plaintext, using a (hopefully) non-repeating pseudorandom key to XOR each bit of the plaintext with one bit of the key

Stream

The NVD uses several factors to classify vulnerabilities. Often these factors are compressed into a data structure called what?

The CVSS Vector

Which of the following is typically modified by a bootkit

The Master Boot Record (MBR)

When wrapping up it is good to set expectations for which of the items below

The length of the question and answer period following the test

In the follwing command: nc -l -p 9999 -e "nc target.host.com" -p 80 what is the -p parameter

The port the command should listen on or send to

The KRACK attack on WPA2 was an attack on which of the following:

The protocol

Which item in Windows, used to store settings, program state, and similar information for many Windows programs, can often contain sensitive information?

The registry

What is the purpose of vulnerability scanning?

To assess the most vulnerable vectors to attack and the reward for doing so.

The firewall on Linux can be configured to forward specific incoming traffic out to another device

True

What should not be assumed when briefing technical staff

Understanding security concepts

Which of these Linux text editors was pointed to in class as providing an option to launch a command shell, which, if the editor was setuid root, would be a root shell?

Vi

Which form of attack targets a site, business, etc. users of a target company may be more likely to visit?

Watering hole attacks

Which of the following Windows features can be abused to allow a logged in user to configure a way to bypass the login screen going forward?

Windows accessibility features

Is there useful information to be gathered from routers in a post-exploitation phase?

Yes

Which of these is a wireless protocol used in many industrial applications?

Zigbee

Which of these causes vulnerabilities in Bluetooth?

all of the above

Which of these events can be used to launch a backdoor or other script

all of the above

Which of these is a form of injection vulnerability

all of the above

Which of these is a security issue with home wireless routers

all of the above

Which of these would be a technique for making your story about why you are on the premesis believable?

all of the above

After the parameters to be passed to the function are pushed onto the stack, what command pushes the current value of EIP onto the stack?

call

Which Metasploit module is often used to clear history?

clearev

Which of the following Windows commands will show all of the recently typed commands from the windows command line?

doskey /history

What is the name for a program which provides access to multiple exploits organized under one user interface?

exploit framework

Which of these is a site that makes descriptions of vulnerabilities available along with proof of concept exploit code?

exploit-db.com

Which of the following commands will show you a list of local administrators

net localgroup administrators

Which of the following is referred to as the "network swiss army knife" and allows you to connect to arbitrary services, proxy traffic, and even listen on a given port and provide a shell?

netcat

What is considered one of the quickest ways to cover your tracks in a penetration test

remove all malware used in the attack

Which of these tools is used for finding domains and address ranges used by an organization?

whois

Which of the following stored procedures will allow you to run arbitrary operating system commands on a MS SQL Server if enabled

xp_cmdshell


Set pelajaran terkait

Modulo 11: How to work with file I/O

View Set

Business Law Chapter 06 Learn It

View Set

240115 - Einmaleins - Multiplikation und Division

View Set

PCC Quiz 6 CH. 64 Rheumatoid Arthritis

View Set

Exercise sceince clinical practise (FIIT Principal)

View Set

Marketing Revision Quiz 1 What is Marketing?

View Set

Health Assessment Exam 2 - Practice Questions

View Set