SEC425 Exam 1
What type of information is gathered by an attacker through Whois database analysis and tracerouting? - Usernames, passwords, and so on - Background of the organization - DNS records and related information - Publicly available email addresses
DNS records and related information
Which of the following NTP commands determines where the NTP server obtains the time from and follows the chain of NTP servers back to its primary time source? - ntpdc - ntpq - ntpdate - ntptrace
ntptrace
Which of the following port number is used to exploit vulnerabilities within DNS servers to launch attacks? - UDP 137 - TCP/UDP 135 - TCP 139 - TCP/UDP 53
TCP/UDP 53
Which of the following TCP communication flags confirms the receipt of a transmission and identifies the next expected sequence number? - FIN flag - ACK flag - RST flag - SYN flag
ACK flag
Which of the following IDS/firewall evasion techniques is used by an attacker to bypass Internet censors and evade certain IDS and firewall rules? - Anonymizers - Sending bad checksums - IP address decoy - Source port manipulation
Anonymizers
Which of the following techniques does an attacker use to snoop on the communication between users or devices and record private information to launch passive attacks? - Spoofing - Eavesdropping - Privilege escalation - Session hijacking
Eavesdropping
Which of the following techniques is used to create complex search engine queries? - Bing search - DuckDuckGo - Yahoo search - Google hacking
Google hacking
Which of the following ping methods is effective in identifying active hosts similar to the ICMP timestamp ping, specifically when the administrator blocks the conventional ICMP ECHO ping? - ICMP ECHO ping sweep - ICMP ECHO ping scan - ICMP address mask ping scan - UDP ping scan
ICMP address mask ping scan
In which of the following hacking phases does an attacker try to detect listening ports to find information about the nature of services running on the target machine? - Scanning - Maintaining access - Clearing tracks - Gaining access
Scanning
What is the output returned by search engines when extracting critical details about a target from the Internet? - Operating systems, location of web servers, users, and passwords - Advanced search operators - Open ports and services - Search engine results pages ("SERPs")
Search engine results pages ("SERPs")
