Ethical Hacking Final

Ace your homework & exams now with Quizwiz!

What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?

BIOS-based rootkit

The print command for Perl is almost identical to the print command used in which of the following programming languages?

C

Which HTTP method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL)?

CONNECT

You must always add "//" at the end of comment text when using C language.

False

Which component holds the IOS a Cisco router can use

Flash Memory

Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?

HFNetChk

Which of the following is a markup language rather than a programming language?

HTML

Which of the following is a utility that is a wireless network detector, sniffer, and an intrusion detection system?

Kismet

What upper-level service is required to utilize file and printer sharing in windows?

Server Message Block

CGI programs can be written in many different programming and scripting languages, such as C/C++, Perl, UNIX shell, Visual Basic, and FORTRAN.

True

Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have.

True

When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?

User-level security

What wireless hacking tool can perform scans for wireless access points and can set up fake APs to social-engineer users or confuse attackers using airbase-ng?

WiFi Pineapple

Which of the following is a flawed wireless authentication standard created to allow users to easily add devices to a wireless network securely?

business logic

What type of system converts between plaintext and ciphertext?

cryptosystem

Routers are the bridge between wired and wireless networks.

false

Red Hat and Fedora Linux use what command to update and manage their RPM packages?

yum

What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?

127 address

Web servers use which of the following elements in an HTML document to allow an individual to submit information to the Web server?

<form>

In the Perl programming language, comment lines begin with which of the following character(s)?

#

Which of the following statements in the C programming language is used to load libraries that hold the commands and functions used in your program?

#include

What standard specifically defines the process of authentication and authorizing users on a network?

802.1X

What programming languages are vulnerable to buffer overflow attacks?

C and C++

Which specific type of tag do All CFML tags begin with?

CF

Which of the following is the interface that determines how a Web server passes data to a Web browser?

CGI

Which of the following is a scripting language for Windows and Linux that performs repetitive tasks, such as password cracking?

EXPECT

When a TCP three-way handshake ends, both parties send what type of packet to end the connection?

FIN

CSMA/CD is implemented at the data link layer on wireless networks.

False

JavaScript is a server-side scripting language that is embedded in an HTML Web page.

False

Samba is a proprietary implementation of CIFS.

False

What type of IDS/IPS is used to protect a critical network server or database server by installing the IDS or IPS software on the system you're attempting to protect?

Host-based

Which type of device monitors a network's hardware so that security administrators can identify attacks in progress and stop them?

IDS

What application is considered the original password-cracking program and is now used by many government agencies to test for password strength?

L0phtcrack

To determine whether a system could be vulnerable to an RPC-related issue, which of the following tools can be used?

MBSA

A device that performs more than one function, such as printing and taxing is called which of the following?

MFD

A device that preforms more than one function, such as printing and faxing is called which of the following?

MFD

Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?

Mandatory Access Control

Which of the following interfaces is a standard database access method, developed by SQL Access Group, that allows an application to access data stored in a database management system (DBMS)?

ODBC

Which of the following interfaces, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system (DBMS)?

OLE DB

Which of the following Window's utilities includes a suite of tools to help administrators deploy and manage servers and even allows for administrators to control mobile devices running Android, iOS, and Windows Mobile OS?

SCCM

What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from router, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools?

SIEM

What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools?

SIEM

What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?

SecureBoot

When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?

Share-level security

SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?

TCP/IP

When a compiler finds errors, it usually indicates what they are so you can correct the code and compile the program again.

True

What type of encryption is currently used to secure WPA2?

WEP

What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?

WPAN

Which of the following is often found within an embedded OS that can cause a potential vulnerability to an attack?

Web server

Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?

Windows CE

Which of the following is a transceiver that connects to a network via an Ethernet cable and brings a wireless LAN with a wired network?

access point (AP)

Which IDS system uses a baseline of normal activity and then sends an alert if the activity deviates significantly from the baseline?

anomaly-based IDS

What type of firewall inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection firewall does?

application-aware firewall

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

apt-get

Which of the following refers to verifying the sender or receiver (or both) is who they claim to be?

authentication

What is the specific act of checking a user's privileges to understand if they should or should not have access to a page, field, resource, or action in an application?

authorization

In the C programming language, which of the following show where a block of code begins and ends?

braces

What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters?

brute force

Which of the following refers to the flow a user is expected to follow in an application to accomplish a goal?

business logic

In what type of attack does the attacker need to access to the cryptosystem, and the ciphertext to be decrypted to yield the desired plaintext result?

chosen-ciphertext

Which of the following does Object Linking and Embedding Database (OLE DB) rely on that allows an application to access data stored on an external device?

connecting strings

Which of the following is the process of converting ciphertext back into plaintext?

decryption

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

domain controllers

Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

firmware

What is the passive process of finding information on a company's network called?

footprinting

In the C programming language, which statement tells the compiler to keep doing what is in the brackets over and over and over?

for(;;)

Which of the following terms is the rate at which a sound wave repeats?

frequency

Which JavaScript functions is a "method" or sequence of statements that preform a routine or task?

getElementById()

Which of the following is a computer placed on the network perimeter with the main goal of distracting hackers from attacking legitimate network resources?

honeypot

What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted form?

known plaintext

Which frequency band is used by commercial AM radio stations?

medium frequency (MF)

What type of operating system sacrifices flexibility for simplicity and fewer hardware resources?

microkernel

In the Perl program, to go from one function to another, you simply call the function by entering which of the following in you source code?

name

What type of IDSs/IPSs monitors activity on network segments by sniffing traffic as it flows over the network and alerting a security administrator when something suspicious occurs?

network-based

What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT) file system?

no ACL support

Which of the following is considered to be the most critical SQL vulnerability?

null SA password

What type of function is being performed when a router screens packets based on information in the packet header?

packet filtering

What type of an IDS is being used when it does not take any action to stop or prevent an activity occurring?

passive system

Which of the following is a backdoor initiated from inside the target's network that makes it possible to take control of the target even when it's behind a firewall?

reverse shell

Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?

scripts

When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?

share-level security

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

signatures

What type of packet filtering records session-specific information about a network connection, including the ports a client uses?

stateful

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

stealth

In the Perl programming language, which of the following keywords is used in front of function names?

sub

What type of cryptography is demonstrated by reversing the alphabet so A becomes Z, B becomes Y, and so on?

substitution cipher

In 802.1X, what component refers specifically to the wireless user attempting access to a WLAN?

supplicant

Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?

symmetric

An octal digit can be represented with only three bits because the largest digit in octal is seven.

true

Symmetric algorithms support confidentiality, but not authentication and nonrepudiation.

true

What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

virus


Related study sets

PHP and MySQL Web Development: Chapters 4, 5, & 6 Quiz

View Set

OCI Operations Associate (1Z0-1067-20)

View Set

Chapter 5: Leadership Mind and Emotion

View Set

PSC 101 Unit 3, Part 3 (Political Participation)

View Set

Econ Quizzes 1-3 (Winter Quarter 2020)

View Set