Hands-On Ethical Hacking and Network Defense 3rd Ed. Chp 3-4 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The acronym IDS stands for which of the following?

Intrusion Detection System

Which HTTP method requests that the entity is stored under the Request-URI?

PUT

Which HTTP method starts a remote Application-layer loopback of the request message?

TRACE

Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

Signatures

A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?

Social-engineering

Which process utilizes the knowledge of human nature to get information from people to use for executing an attack on a computer network?

Social-engineering

When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?

Spear phishing

If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?

Spyware

Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?

Spyware

A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?

Phishing / Spearphising

To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?

nc -h

Which utility is used to gather IP and domain information?

Whois

What type of general commands allow a security tester to pull information from a Web server using a web browser?

ZAP

Which HTTP error informs you the server understands the request but refuses to comply?

403 Forbidden

Which type of program can mitigate some risks associated with malware

Antivirus

Which HTTP method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL)?

CONNECT

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

Computer security

What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?

Piggybacking

What type of virus is used to lock a user's system, or cloud accounts until the system's owner complies by paying the attacker a monetary fee?

Ransomware

Which of the following is created after an attack and usually hides within the OS tools, so it is almost impossible to detect?

Rootkit

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

Signatures

What is the passive process of finding information on a company's network called?

Footprinting

Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?

Card access

When an individual attempts to discover as much information legally possible about their competition, what information gathering technique are they performing?

Competitive Intelligence

Which type of social engineering attack attempts to discover personal information through the use of email?

Phishing

What type of malicious computer programs present themselves as useful computer programs or applications?

Trojan programs

In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.

True

Malware is malicious software, such as a virus, worm, or Trojan program, introduced into a network.

True

Network attacks can often begin by gathering information from a company's Web site.

True

Whitelisting allows only approved programs to run on a computer.

True

What 1-pixel x 1-pixel image file is referenced in an tag, and usually works with a cookie to collect information about the person visiting the Website?

Web bug

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

Worm

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

Zombies

What area of a network is a major area of potential vulnerability because of the use of URLs?

DNS

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

Denial of Service

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

Eavesdropping

A DDoS attack is launched against a host from a single server or workstation.

False

Malware programs cannot be detected by antivirus programs

False

Namedroppers is a tool that can be used to capture Web server information and vulnerabilities in a Web site's pages that could allow exploits such as SQL injection and buffer overflows.

False

The HTTP CONNECT method starts a remote application-layer loopback of the request message.

False

What is the HTTP method that retrieves data by URI?

GET


Set pelajaran terkait

Disease Mechanisms II Exam 2 Material Part 1

View Set

ARE PcM 5.0: Practice Management

View Set

MGT 3830 Chapter 3 study material 65

View Set

ch2, Chapter 1: Project Mangement

View Set

CH 4 - Accrual Accounting Concepts

View Set

Medical Interventions (MI)1.2Parts of a Bacterial Cell

View Set