Ethical Hacking Chapter 1, Ethical Hacking Chapter 2, Ethical Hacking Chapter 3, Ethical Hacking Chapter 4, Ethical Hacking Chapter 5
Which federal law amended Chapter 119 of Title 18, U.S. Code?
U.S. Patriot Act, Sec. 217: Interception of Computer Trespasser Communications
The base 64 numbering system uses ____ bits to represent a character.
6
Which type of scan is usually used to bypass a firewall or packet-filtering device?
ACK scan
What portion of your ISP contract might affect your ability to conduct a penetration test over the Internet?
Acceptable use policy
What's one way to gather information about a domain?
View the header of an e-mail you send to an e-mail account that doesn't exist.
If you're trying to find newsgroup postings by IT employees of a certain company, which of the following Web sites should you visit?
http://groups.google.com
What's the first method a security tester should attempt to find a password for a computer on the network?
Ask the user.
Which federal law prohibits unauthorized access of classified information?
Computer Fraud and Abuse Act, Title 18
How can you find out which computer crime laws are applicable in your state?
Contact your local law enforcement agencies.
_____ is one of the components most vulnerable to network attacks.
DNS
What type of network attack relies on multiple servers participating in an attack on one host system?
Distributed denial-of-service attack
What is the main purpose of Malware?
Doing harm to a computer system
What organization offers the Certified Ethical Hacker (CEH) certification exam?
EC-Council
Which federal law prohibits intercepting any communication, regardless of how it was transmitted?
Electronic Communication Privacy Act
What's the hexadecimal equivalent of the binary number 1111 1111?
FF
If you run a program in New York City that uses network resources to the extent that a user is denied access to them, what type of law have you violated?
Federal
What component can be used to reduce the risk of a Trojan program or rootkit sending information from an attacked computer to a remote host?
Firewall
Which command verifies the existence of a node on a network?
Ping
What port, other than port 110, is used to retrieve e-mail?
Port 143
A FIN packet sent to a closed port responds with which of the following packets?
RST
To determine a company's primary DNS server, you can look for a DNS server containing which of the following?
SOA record
Which of the following is one method of gathering information about the operating systems a company is using?
Search the Web for e-mail addresses of IT employees.
Discovering a user's password by observing the keys he or she presses is called which of the following?
Shoulder surfing
Which protocol offers guaranteed delivery and is connection oriented?
TCP
Which of the following exploits might hide its destructive payload in a legitimate application or game?
Trojan program
A computer _____ relies on a host to propagate throughout a network.
Virus
Which of the following doesn't attach itself to a host but can replicate itself?
Worm
Which of the following enables you to view all host computers on a network?
Zone transfers
Why does the fping -f 193.145.85.201 193.145.85.220 command cause an error?
An incorrect parameter is used.
An exploit that attacks computer systems by inserting executable code in areas of memory not protected because of poorly written code is called which of the following?
Buffer overflow
What exploit is used to elevate an attacker's permissions by inserting executable code in the computer's memory?
Buffer overflow
Port scanning provides the state for all but which of the following ports?
Buffered
As a security tester, what should you do before installing hacking software on your computer?
Check with local law enforcement agencies.
Which of the following contains host records for a domain?
DNS
Which of the following is an example of a macro programming language?
Visual Basic for Applications
A closed port responds to a SYN packet with which of the following packets?
RST
A team composed of people with varied skills who attempt to penetrate a network is referred to as which of the following?
Red team
To determine whether scanning is illegal in your area, you should do which of the following?
Refer to state laws.
When conducting competitive intelligence, which of the following is a good way to determine the size of a company's IT support staff?
Review job postings on Web sites such as www.monster.com or www.dice.com.
Which organization issues the Top 20 list of current network vulnerabilities?
SANS Institute
"Destination Unreachable" is designated by which ICMP type code?
Type 3
A Ping command initially uses which ICMP type code?
Type 8
To see a brief summary of Nmap commands in a Linux shell, which of the following should you do?
Type nmap -h.
To reduce the risk of a virus attack on a network, you should do which of the following?
All of the above
Which of the following is a good Web site for gathering information on a domain?
All of the above
Entering a company's restricted area by following closely behind an authorized person is referred to as which of the following?
Piggybacking
The U.S. Department of Justice defines a hacker as which of the following?
A person who accesses a computer or network without the owner's permission
A penetration tester is which of the following?
A security professional who's hired to hack into a network to discover vulnerabilities
The initial sequence number (ISN) is set at which step of the TCP three-way handshake?
1 and 2
Which of the following is not a valid octal number?
3482
Before conducting a security test by using social-engineering tactics, what should you do?
Get written permission from the person who hired you to conduct the security test.
Which of the following is a tool for creating a custom TCP/IP packet and sending it to a host computer?
Hping
What protocol is used for reporting or informational purposes?
ICMP
In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of packet to confirm that the host computer is live?
ICMP Echo Reply (type 0)
What organization designates a person as an OPST?
ISECOM
What is a potential mistake when performing a ping sweep on a network?
Including a broadcast address in the ping sweep range
What organization designates a person as a CISSP?
International Information Systems Security Certification Consortium (ISC2)
A software or hardware component that records each keystroke a user enters is called which of the following?
Keylogger
Which of the following is a good place to begin your search for vulnerabilities of Microsoft products?
Microsoft Security Bulletins
A(n) ________ scan sends a packet with all flags set to NULL.
NULL
On a Windows computer, what command can you enter to show all open ports being used?
Netstat
What is the most widely used port-scanning tool?
Nmap
TCP communication could be likened to which of the following?
Phone conversation
To find extensive Nmap information and examples of the correct syntax to use in Linux, which of the following commands should you type?
man nmap
The Netstat command indicates that POP3 is in use on a remote server. Which port is the remote server most likely using?
Port 110
What port does DNS use?
Port 53
Security testers and hackers use which of the following to determine the services running on a host and the vulnerabilities associated with these services?
Port scanning
Which protocol uses UDP?
TFTP
That command is used to log on to a remote server, computer, or router?
Telnet
Many social engineers begin gathering the information they need by using which of the following?
The telephone