Ethical Hacking

Ace your homework & exams now with Quizwiz!

Which HTTP error informs you the server understands the request but refuses to comply?

403 Forbidden

Which of the following encryption standards is part of the NSA's suite B cryptographic algorithms and is validated strong enough to protect classified data?

AES-256

Technology is restricted to a single room or line of sight because this light spectrum cannot penetrate walls

Infrared (IR)

If a Cisco administrator needs to configure a serial or Fast Ethernet port, which configuration mode should they use?

Interface configuration mode

What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android, Windows Mobile, and the Apple iPhone OS?

Java-based

Which of the following is a common Linux rootkit?

Linux Rootkit 5

To determine whether a system could be vulnerable to an RPC-related issue, which of the following tools can be used?

MBSA

An OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users

Mandatory access control

Which of the following EAP methods uses TLS to authenticate the server to the client, but not the client to the server?

PEAP

Which of the following systems should be used when equipment monitoring and automation is critical?

SCADA

The name used to identify a WLAN

SSID

Routers operate at the Network layer of the TCP/IP protocol stack.

True

Wget is a *nix system command that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet.

True

SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?

air gap

Which of the following is contained in a wireless frequency band and breaks up the band into smaller frequency ranges?

channels

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?

ciphertext-only

A port state which does not allow entry or access to a service

closed port

What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?

dumpster diving

An interprocess communication mechanism that allows a program running on one host to run code on a remote host

remote procedure call

Data is spread across a large-frequency bandwidth instead of traveling across just one frequency band

spread spectrum

Red Hat and Fedora Linux use what command to update and manage their RPM packages?

yum

Which process enables you to see all the host computers on a network and basically give you a diagram of an organization's network?

zone transfers

What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?

127 address

A standard that addresses the issue of authentication

802.1x

Which IDS system uses a baseline of normal activity and then sends an alert if the activity deviates significantly from this baseline?

Anomaly-based IDS

Windows Server 2012 introduced what protection feature to prevent pass-the-hash attacks?

Authentication Silos

What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?

BIOS-based rootkit

Adobe System's ColdFusion uses its proprietary tags, which are written in which of the following languages?

CFML

What acronym represents the U.S. Department of Justice new branch that addresses computer crime?

CHIP

For a Windows computer to be able to access a *nix resource, which of the following must be enabled on both systems?

CIFS

A standardized protocol that replaced SMB in Windows 2000 Server and later

Common internet file system

What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer's OS?

Connect

Which Windows 10 feature uses virtualization to protect access tokens from theft by attackers?

Credential Guard

Which of the following application tests analyzes a running application for vulnerabilities?

Dynamic Application Security Testing

An enhancement to PPP, that was designed to allow a company to select its authentication method

EAP

Data hops to other frequencies to avoid interference that might occur over a frequency band

FHSS

A DDoS attack is launched against a host from a single server or workstation.

False

A hex number is written with two characters, each representing a byte.

False

All of the enumeration techniques that work with older Windows OSs still work with Windows Server 2012.

False

As a security tester, you can make a network impenetrable.

Fasle

Which of the following is a useful enumeration tool that enables you to find out who is logged into a *nix system with one simple command?

Finger utility

Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux

Fping

What boot loader will allow your computer or laptop to start in both Windows and Linux?

GRUB

What specific term does the U.S. Department of Justice use to label all illegal access to computer or network systems?

Hacking

Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets

Hping

Which type of device monitors a network's hardware so that security administrators can identify attacks in progress and stop them?

IDS

What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?

Internet

What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

Keyloggers

A device that performs more than one function, such as printing and faxing is called which of the following?

MFD

What router feature provides basic security by mapping internal private IP addresses to public external IP addresses, essentially hiding the internal infrastructure from unauthorized personnel?

NAT

Which of the following commands is a powerful enumeration tool included with Windows?

Nbtstat

The original utility from which OpenVas was developed

Nessus

A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP

NetBEUI

Which of the following protocols does NetBios use to access a network resource?

NetBEUI

Windows programming interface that allows computers to communicate across a local area network

NetBIOS

What tool can be used to read and write data to ports over a network?

Netcat

A popular port scanners that has the ability to use a GUI front end

Nmap

Which of the following interfaces is a standard database access method, developed by SQL Access Group, that allows an application to access data stored in a database management system (DBMS)?

ODBC

Which of the following interfaces, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system (DBMS)?

OLE DB

An open-source fork of Nessus

OpenVAS

The open-source descendant of Nessus is called which of the following?

OpenVAS

What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?

Piggybacking

Closed ports respond to a NULL scan with what type of packet?

RST

An older network management service which enables remote administration and run on both Windows and *nix systems

SNMP

An open-source implementation of CIFS

Samba

Which of the following is an open-source implementation of CIFS?

Samba

A large organization that is responsible for sensitive or critical data may elect to create which of the following to do damage assessment, risk remediation, and legal consultation?

Security Operations Center

Used to share files and usually runs on top of NetBIOS, NetBEUI, or TCP/IP

Server message block

If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?

Spyware

Which of the following application tests analyzes an application's source code for vulnerabilities, and is therefore only possible when the source code of an application is available?

Static Application Security Testing

Which of the following cross-site scripting vulnerabilities types is especially harmful because it can be delivered to subsequent users of the application?

Stored

In 2007 became Windows new standard to deploy and manage servers alongside updated patch-management functionality

System center configuration manager

Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005

Systems management server

What protocol is the most widely used and allows all computers on a network to communicate and function

TCP/IP

What subject area is not one of the 22 domains tested during the CEH exam?

Trojan hijacking

ECC is an efficient algorithm requiring few hardware resources, so it's a perfect candidate for wireless devices and cell phones.

True

In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.

True

It is possible to have a wireless network that does not connect to a wired network.

True

Malware is malicious software, such as a virus, worm, or Trojan program, introduced into a network.

True

No matter what medium connects computers on network-copper wires, fiber-optic cables, or a wireless setup; the same protocol must be running on all computers if communication is going to function correctly.

True

Port scanning is a method of finding out which services a host computer offers.

True

The latest version of Nessus Server and Client can run on Windows, Mac OS X, FreeBSD, and most Linux distributions.

True

When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?

User-level security

Designed for use on tablets and traditional PCs and only allows trusted applications by default through Device Guard

Windows 10

Builds on the security advances made in Vista with the introduction of AppLocker

Windows 7

The first Microsoft GUI product that didn't rely on DOS

Windows 95

Introduced Authentication Silos to prevent pass-the-hash attacks

Windows Server 2012

Introduces Windows Containers to allow for application isolation to protect applications from one another

Windows Server 2016

First Windows version to introduce User Account Control and BitLocker

Windows Vista

A Windows client/server technology introduced in 2005 used to manage patching and updating system software from the network

Windows software update services

A certificate contains a unique serial number and must follow which standard that describes the creating of a certificate?

X.509

What type of port scan has the FIN, PSH, and URG flags set?

XMAS scan

When hackers drive around or investigate an area with an antenna, they are usually looking for which component of a wireless network?

access point

An independent WLAN without an AP

ad-hoc network

The virus signature file is maintained by what type of software?

antivirus

Which type of program can mitigate some risks associated with malware?

antivirus

What type of firewall inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection firewall does?

application-aware firewall

Amount of code a computer system exposes to unauthenticated outsiders

attack surface

What is the specific act of checking a user's privileges to understand if they should or should not have access to a page, field, resource, or action in an application?

authorization

What penetration model should be used when a company's management team does not wish to disclose that penetration testing is being conducted?

black box

When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?

buffer overflow

Which of the following refers to the flow a user is expected to follow in an application to accomplish a goal?

business logic

Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?

card access

Which of the following does Object Linking and Embedding Database (OLE DB) rely on that allows an application to access data stored on an external device?

connection strings

When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack" the company's network, they should proceed by performing what precautionary step?

consult their lawyer

Which of the following is a text file generated by a Web server and stored on a user's browser?

cookie

Which of the following is the process of converting ciphertext back into plaintext?

decryption

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

denial-of-service

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

domain controllers

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

eavesdropping

Which of the following is a mathematical function or program that works with a key?

encryption algorithm

Process of extracting critical information from a network

enumeration

AES uses a 128-bit key and is used in PGP encryption software.

false

A port state that may indicate a firewall is being used to allow specified traffic into or out of the network

filtered port

Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

firmware

When security professionals create a packet, they may choose to specifically set which of the following fields to help initiate a response from a target computer?

flag

Which of the following terms is the rate at which a sound wave repeat?

frequency

Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

heuristics

Which frequency band is used by commercial AM radio stations?

medium frequency (MF)

Defines how data is placed on a carrier signal

modulation

A technology that uses microwave radio band frequencies to transmit data

narrowband

To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?

nc -h

What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT) file system?

no ACL support

Which of the following is considered to be the most critical SQL vulnerability?

null SA password

Unauthenticated connection to a Windows computer that uses no logon and password values.

null session

What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS systems?

null session

A port state that allows access to applications and can be vulnerable

open port

What type of an IDS is being used when it does not take any action to stop or prevent an activity occurring?

passive system

When using a port-scanner, what procedure can be conducted to identify which IP addresses belong to active hosts?

ping sweep

If you work for a company as a security professional, you will most likely be placed on a special team that will conduct penetration tests. What is the standard name for a team made up of security professionals?

red team

One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?

reply

Which of the following is created after an attack and usually hides within the OS tools, so it is almost impossible to detect?

rootkit

Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?

router

What type of testing procedure involves the tester(s) analyzing the company's security policy and procedures, and reporting any vulnerabilities to management?

security test

Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?

shoulder surfing

In 802.11, which of the following is an addressable unit?

station (STA)

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

stealth

Which type of symmetric algorithm operates on plaintext one bit at a time?

stream ciphers

Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?

symmetric

What type of assessment performed by a penetration tester attempts to identify all the weaknesses found in an application or on a system?

vulnerability

What penetration model would likely provide a network diagram showing all the company's routers, switches, firewalls, and intrusion detection systems, or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?

white box

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

worm

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

zombies

Which of the following IEEE projects was developed to create LAN and WAN standards?

802

Which of the following sits between the Internet and the internal network and is sometimes referred to as a perimeter network?

DMZ

What area of a network is a major area of potential vulnerability because of the use of URLs?

DNS

Data packets are spread simultaneously over multiple frequencies instead of hopping to other frequencies

DSSS

Which of the following protocols is an enhancement to PPP, and was designed to allow a company to select its authentication method?

EAP

In a NULL scan, all packet flags are turned on.

False

Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012 have most services and features enabled by default.

False

What configuration mode allows a Cisco administrator to configure router settings that affect the overall operations of the router?

Global configuration mode

What encryption algorithm can be used for both encryption and digital signing, uses a one-way function, and is still widely used in e-commerce?

RSA

Which of the following cross-site scripting vulnerabilities types relies on social engineering to trick a user into visiting a maliciously crafted link or URL?

Reflected

There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.

True

Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts

ping sweep

Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly

port scanning


Related study sets

Chapter 39: Nutritional Problems

View Set

Med Surg EKG/Cardiac Rhythms Quiz

View Set