Ethical Hacking Quiz Week 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In Perl, comment lines begin with the ____ character(s). % // # $

#

In a Linux script, the line ____ is important because it identifies the file as a script. #!/bin/sh #!/bin/script #!/bin/shscript #!/bin/sc

#!/bin/sh

The ____ statement in C is used to load libraries that hold the commands and functions used in your program. #include package use #import

#include

In Perl, variables begin with the ____ character. % ! * $

$

The logical operator in C that is evaluated as true if both sides of the operator are true is ____. = && || ==

&&

The mathematical operator in C that increments the unary value by 1 is ____. + % ++ &

++

The ____ option of Nmap is used to perform a TCP SYN stealth port scan. -sS -sU -sV -S

-sS

You can use /* and */ instead of ____ symbol(s) for one-line comments in C. # #! ** //

//

NetBIOS names have a limit of ____ characters. 8 12 16 24

16

LDAP (port ____) is the protocol used to access Novell's eDirectory, Microsoft Active Directory, and Apple Open Directory. 52 89 128 389

389

The best way to protect a network from SMB attacks is to make sure routers filter out ports 137 to 139 and ____. 135 389 445 636

445

HTTP uses port ____ to connect to a Web service. 21 22 25 80

80

The Trojan program called Sheepshank makes HTTP GET requests over port ____. 25 80 129 139

80

The logical operator in C that is used to compare the equality of two variables is ____. = && || ==

==

____ is a reasonably priced commercial port scanner with a GUI interface. AW Security Port Scanner Common Vulnerabilities and Exposures Ethereal Tcpdump

AW Security Port Scanner

____ takes you from one area of a program (a function) to another area. Branching Looping Testing Dividing

Branching

The print command for Perl is almost identical to the ____ print command. Java C PHP Smalltal

C

UNIX was first written in assembly language, soon rewritten in ____. Smalltalk Perl Python C

C

For a Windows computer to be able to access a *nix resource, ____ must be enabled on both systems. NetBIOS SMB CIFS NetBEUI

CIFS

NetWare's ____ is a graphical Java utility for centralized network administration. ConsoleOne Bindery eDirectory Client32

ConsoleOne

The C programming language was developed by ____ at Bell Laboratories in 1972. James Gosling Larry Wall Dennis Ritchie Larry Tesler

Dennis Ritchie

Windows 95 uses the ____ file system. FAT16 FAT32 NTFS ext3

FAT16

Windows 98 introduced the ____ file system. FAT16 FAT32 NTFS ext3

FAT32

When a TCP three-way handshake ends, both parties send a(n) ____ packet to end the connection. SYN ACK FIN RST

FIN

A NetBIOS name does not need to be unique on a network. True/False

False

A closed port can be vulnerable to an attack. True/False

False

A closed port responds to a SYN scan with an RST packet, so if no packet is received, the best guess is that the port is open. True/False

False

A disadvantage of Nmap is that it is very slow because it scans all the 65,000 ports of each computer in the IP address range. True/False

False

Most programming languages do not have a way to conduct testing of a variable. True/False

False

The Netmon Agent is a Linux network-monitoring tool. True/False

False

You must always add "//" at the end of comment text in C. True/False

False

The most popular enumeration tool for security testers and hackers alike is the ____ utility, which enables you to find out who is logged in to a *nix system with one simple command. Whois Finger Ping Who

Finger

With the ____ tool, you can ping multiple IP addresses simultaneously. Fping Nmap Nessus Unicornscan

Fping

With ____, you can have your desktop computer or laptop start in both Windows and Linux. Grand Unified Bootloader FreeBSD Boot NetWare Connect 5.0 Connection Client

Grand Unified Bootloader

MBSA has its origins in the ____ scanner. MDAC HFNetChk MSXML Mbsacli

HFNetChk

____ is a markup language rather than a programming language. C HTML Perl PHP

HTML

Many security testers use the ____ tool to bypass filtering devices by injecting modified IP packets. Tcpdump Hping Nmap Nessus

Hping

The ____ tool enables you to craft an IP packet to your liking. Unicornscan Hping Nmap Ethereal

Hping

____ is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas. IIS Zion NetDDE Hyena

Hyena

In NetWare 5.0, TCP/IP replaced ____ as the default protocol. NetBIOS IPX/SPX ATM LDAP

IPX/SPX

If the LRK5 rootkit is installed on a Linux computer, entering the Trojaned ____ command allows the attacker's processes to continue running, even though the Linux administrator thinks all processes were killed. Killall Get target Dir

Killall

A common Linux rootkit is ____. Back Orfice Kill Trojans Packet Storm Security Linux Rootkit 5

Linux Rootkit 5

____ is the act of performing a task over and over. Branching Looping Testing Remembering

Looping

To determine whether a system is vulnerable to an RPC-related issue, the best tool is ____. Nessus Winfingerprint MBSA Unicornscan

MBSA

SELinux contains several features and modules that use ____, an OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users. Mandatory Access Control (MAC) Server Message Block (SMB) Common Internet File System (CIFS) Microsoft Baseline Security Analyzer (MBSA)

Mandatory Access Control (MAC)

Complete instructions for MBSA are available from the MBSA Help interface or the ____ site. Microsoft Security Tools Web Microsoft Knowledge Base Windows Help Windows On-line Help

Microsoft Security Tools Web

NetBIOS over TCP/IP is called ____ in Windows 2000 Server. NBT NetBEUI NetBT NetTCP/IP

NBT

Windows NT 3.51 uses the ____ file system. FAT16 FAT32 NTFS ext3

NTFS

The ____ command is a powerful enumeration tool included with Windows. NessusWX Nbtstat NetDDE Netmon Agent

Nbtstat

The ____ command gives you a quick way to see whether there are any shared resources on a computer or server. Nbtstat Net view NetDDE Netmon Agent

Net view

NetBIOS is not a protocol; it usually works with ____, a fast, efficient protocol that requires little configuration. TCP/IP NBT NetBT NetBEUI

NetBEUI

Early Windows OSs communicated with each other by using ____. Microsoft RPC IPX/SPX Winsock NetBIOS

NetBIOS

The computer names you assign to Windows systems are called ____ names. Active Directory NetBIOS NetDDE IIS

NetBIOS

NetBIOS over TCP/IP is called ____ in Windows Server 2003. NBT NetBEUI NetBT NetTCP/IP

NetBT

____ is a system process that runs on Windows OSs to facilitate the exchange of network data. NetBIOS Active Directory NetDDE IIS

NetDDE

The ____ tool was originally written for Phrack magazine in 1997 by Fyodor. Unicornscan Fping Nessus Nmap

Nmap

____ is currently the standard port-scanning tool for security professionals. Unicornscan Fping Nessus Nmap

Nmap

The most recent version of Novell OS is called ____. NetWare 6.0 NetWare 6.5 Novell Open Enterprise Server Novell NetWare 4.0 Server

Novell Open Enterprise Server

The open-source descendant of Nessus is called ____. NW WNessus OpenVAS WinNessus

OpenVAS

____, an open-source fork of Nessus, functions much like a database server, performing complex queries while the client interfaces with the server to simplify reporting and configuration. Unicornscan NetScanTools OpenVAS Nmap

OpenVAS

The Conficker worm took advantage of a vulnerability in ____ to run arbitrary code on susceptible hosts. SQL Server RPC Windows Registry NetBIOS

RPC

____ is an interprocess communication mechanism that allows a program running on one host to run code on a remote host. RPC NetBIOS Winsock NetBEUI

RPC

A computer that receives a SYN packet from a remote computer responds to the packet with a(n) ____ packet if its port is open. FIN RST SYN/ACK ACK

SYN/ACK

____ is an open-source implementation of CIFS. Samba GNUCIFS GCIFS OpenCIFS

Samba

Trusted Computer Solutions____ program is used to tighten Linux system security configuration by using templates. OpenVAS MBSA SQL Server Security Blanket

Security Blanket

____ is a client/server technology designed to manage patching and updating systems software from the network. Systems Management Server (SMS) Software Update Services (SUS) Automatic Update Patch Manager

Software Update Services (SUS)

SMB usually runs on top of NetBIOS, NetBEUI, or ____. Winsock CIFS TCP/IP IPX/SPX

TCP/IP

____ is a protocol packet analyzer. Nmap Fping Tcpdump Nessus

Tcpdump

Bugs are worse than syntax errors because a program can run successfully with a bug, but the output might be incorrect or inconsistent. True/False

True

HTML doesn't use branching, looping, or testing. True/False

True

NBTscan is a tool for enumerating Windows OSs. True/False

True

NTFS was implemented to replace FAT16 and FAT32 because of the difficulty in incorporating security in these file systems. True/False

True

Port scanning is a method of finding out which services a host computer offers. True/False

True

Security professionals often need to examine Web pages and recognize when something looks suspicious. True/False

True

The enumeration process for Windows Me is the same as for Windows 98. True/False

True

To compile the "syntax.c" program in *nix you enter the gcc -c syntax.c -o syntax.o command. True/False

True

You can search for known vulnerabilities in a host computer by using the Common Vulnerabilities and Exposures Web site. True/False

True

Unicornscan optimizes ____ scanning beyond the capabilities of any other port scanner. TCP UDP ICMP IP

UDP

____ implemented Windows File Protection to prevent core system files from being overwritten. Unicornscan NetScanTools Nessus Nmap

Unicornscan

In ____, instead of peer-to-peer networks, a client/server model was created in which a server was responsible for authenticating users and giving them access to resources on a network. Windows 95 Windows 98 Windows Me Windows NT 3.51

Windows NT 3.51

____ implemented Windows File Protection to prevent core system files from being overwritten. Windows 95 Windows 98 Windows NT 3.51 Windows XP Professional

Windows XP Professional

Closed ports respond to a(n) ____ with an RST packet. XMAS scan SYN scan Connect scan ACK scan

XMAS scan

The ____ special character is used with the printf() function in C to indicate a new line. \t \0 \n \l

\n

The ____ special character is used with the printf() function in C to indicate a tab. \t \0 \n \l

\t

In C, ____ show where a block of code begins and ends. braces parenthesis brackets dashes

braces

In any *NIX system, after saving a script, you need to make it executable so that you can run it. From the command line, type ____. chmod +execute script_name chmod +x script_name chmod -execute script_name chmod -x script_name

chmod +x script_name

The ____ relies on the OS of the attacked computer, so it's a little more risky to use than the SYN scan. NULL scan connect scan XMAS scan ACK scan

connect scan

The ____ vi command deletes the current line. d dl dd dw

dd

Windows Server 2003 and 2008 ____ are used to authenticate user accounts, so they contain much of the information that attackers want to access. SMB controllers domain controllers CIFS servers file servers

domain controllers

____ is an enhancement to NDS (NetWare Directory Services). Active Directory Bindery X.500 eDirectory

eDirectory

In C, the statement ____ tells the compiler to keep doing what's in the brackets over and over and over. loop continue do(forever) for(;;)

for(;;)

In HTML, each tag has a matching closing tag that's written with a(n) ____ added. forward slash (/) backward slash (\) bang (!) ampersand (&)

forward slash (/)

A ____ is a mini program within a main program that carries out a task. function script branch loop

function

Software engineering firms don't retain computer programmers who do not document their work because they know that 80% of the cost of software projects is ____. documentation debugging testing maintenance

maintenance

One of the biggest vulnerabilities of NetBIOS systems is a(n) ____, which is an unauthenticated connection to a Windows computer using no logon and password values. open session unauthorized session void session null session

null session

If you want to know what the Perl print command does, you can use ____. perl -h perldoc -f print perl -h print man perl print

perldoc -f print

A ____ or batch file is a text file containing multiple commands that are normally entered manually at the command prompt. script program snippet signature

script

In Perl, the keyword "____" is used in front of function names. func declare sub proc

sub

In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be "____". open closed unfiltered unassigned

unfiltered

Red Hat and Fedora Linux use the ____ command to update and manage RPM packages. yum get dir alert

yum


Set pelajaran terkait

chapter 11: stockholders' equity

View Set

N204 Midterm Exam Prep Questions

View Set

Chapter 36 - Coronary Artery Disease (Questions)

View Set