Ethical Hacking Final
What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?
BIOS-based rootkit
The print command for Perl is almost identical to the print command used in which of the following programming languages?
C
Which HTTP method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL)?
CONNECT
You must always add "//" at the end of comment text when using C language.
False
Which component holds the IOS a Cisco router can use
Flash Memory
Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?
HFNetChk
Which of the following is a markup language rather than a programming language?
HTML
Which of the following is a utility that is a wireless network detector, sniffer, and an intrusion detection system?
Kismet
What upper-level service is required to utilize file and printer sharing in windows?
Server Message Block
CGI programs can be written in many different programming and scripting languages, such as C/C++, Perl, UNIX shell, Visual Basic, and FORTRAN.
True
Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have.
True
When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?
User-level security
What wireless hacking tool can perform scans for wireless access points and can set up fake APs to social-engineer users or confuse attackers using airbase-ng?
WiFi Pineapple
Which of the following is a flawed wireless authentication standard created to allow users to easily add devices to a wireless network securely?
business logic
What type of system converts between plaintext and ciphertext?
cryptosystem
Routers are the bridge between wired and wireless networks.
false
Red Hat and Fedora Linux use what command to update and manage their RPM packages?
yum
What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?
127 address
Web servers use which of the following elements in an HTML document to allow an individual to submit information to the Web server?
<form>
In the Perl programming language, comment lines begin with which of the following character(s)?
#
Which of the following statements in the C programming language is used to load libraries that hold the commands and functions used in your program?
#include
What standard specifically defines the process of authentication and authorizing users on a network?
802.1X
What programming languages are vulnerable to buffer overflow attacks?
C and C++
Which specific type of tag do All CFML tags begin with?
CF
Which of the following is the interface that determines how a Web server passes data to a Web browser?
CGI
Which of the following is a scripting language for Windows and Linux that performs repetitive tasks, such as password cracking?
EXPECT
When a TCP three-way handshake ends, both parties send what type of packet to end the connection?
FIN
CSMA/CD is implemented at the data link layer on wireless networks.
False
JavaScript is a server-side scripting language that is embedded in an HTML Web page.
False
Samba is a proprietary implementation of CIFS.
False
What type of IDS/IPS is used to protect a critical network server or database server by installing the IDS or IPS software on the system you're attempting to protect?
Host-based
Which type of device monitors a network's hardware so that security administrators can identify attacks in progress and stop them?
IDS
What application is considered the original password-cracking program and is now used by many government agencies to test for password strength?
L0phtcrack
To determine whether a system could be vulnerable to an RPC-related issue, which of the following tools can be used?
MBSA
A device that performs more than one function, such as printing and taxing is called which of the following?
MFD
A device that preforms more than one function, such as printing and faxing is called which of the following?
MFD
Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?
Mandatory Access Control
Which of the following interfaces is a standard database access method, developed by SQL Access Group, that allows an application to access data stored in a database management system (DBMS)?
ODBC
Which of the following interfaces, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system (DBMS)?
OLE DB
Which of the following Window's utilities includes a suite of tools to help administrators deploy and manage servers and even allows for administrators to control mobile devices running Android, iOS, and Windows Mobile OS?
SCCM
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from router, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools?
SIEM
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools?
SIEM
What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?
SecureBoot
When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?
Share-level security
SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?
TCP/IP
When a compiler finds errors, it usually indicates what they are so you can correct the code and compile the program again.
True
What type of encryption is currently used to secure WPA2?
WEP
What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?
WPAN
Which of the following is often found within an embedded OS that can cause a potential vulnerability to an attack?
Web server
Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?
Windows CE
Which of the following is a transceiver that connects to a network via an Ethernet cable and brings a wireless LAN with a wired network?
access point (AP)
Which IDS system uses a baseline of normal activity and then sends an alert if the activity deviates significantly from the baseline?
anomaly-based IDS
What type of firewall inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection firewall does?
application-aware firewall
Ubuntu and Debian Linux use what command to update and manage their RPM packages?
apt-get
Which of the following refers to verifying the sender or receiver (or both) is who they claim to be?
authentication
What is the specific act of checking a user's privileges to understand if they should or should not have access to a page, field, resource, or action in an application?
authorization
In the C programming language, which of the following show where a block of code begins and ends?
braces
What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters?
brute force
Which of the following refers to the flow a user is expected to follow in an application to accomplish a goal?
business logic
In what type of attack does the attacker need to access to the cryptosystem, and the ciphertext to be decrypted to yield the desired plaintext result?
chosen-ciphertext
Which of the following does Object Linking and Embedding Database (OLE DB) rely on that allows an application to access data stored on an external device?
connecting strings
Which of the following is the process of converting ciphertext back into plaintext?
decryption
What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?
domain controllers
Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?
firmware
What is the passive process of finding information on a company's network called?
footprinting
In the C programming language, which statement tells the compiler to keep doing what is in the brackets over and over and over?
for(;;)
Which of the following terms is the rate at which a sound wave repeats?
frequency
Which JavaScript functions is a "method" or sequence of statements that preform a routine or task?
getElementById()
Which of the following is a computer placed on the network perimeter with the main goal of distracting hackers from attacking legitimate network resources?
honeypot
What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted form?
known plaintext
Which frequency band is used by commercial AM radio stations?
medium frequency (MF)
What type of operating system sacrifices flexibility for simplicity and fewer hardware resources?
microkernel
In the Perl program, to go from one function to another, you simply call the function by entering which of the following in you source code?
name
What type of IDSs/IPSs monitors activity on network segments by sniffing traffic as it flows over the network and alerting a security administrator when something suspicious occurs?
network-based
What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT) file system?
no ACL support
Which of the following is considered to be the most critical SQL vulnerability?
null SA password
What type of function is being performed when a router screens packets based on information in the packet header?
packet filtering
What type of an IDS is being used when it does not take any action to stop or prevent an activity occurring?
passive system
Which of the following is a backdoor initiated from inside the target's network that makes it possible to take control of the target even when it's behind a firewall?
reverse shell
Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?
scripts
When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?
share-level security
Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?
signatures
What type of packet filtering records session-specific information about a network connection, including the ports a client uses?
stateful
Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?
stealth
In the Perl programming language, which of the following keywords is used in front of function names?
sub
What type of cryptography is demonstrated by reversing the alphabet so A becomes Z, B becomes Y, and so on?
substitution cipher
In 802.1X, what component refers specifically to the wireless user attempting access to a WLAN?
supplicant
Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?
symmetric
An octal digit can be represented with only three bits because the largest digit in octal is seven.
true
Symmetric algorithms support confidentiality, but not authentication and nonrepudiation.
true
What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?
virus