14 d4 hw Flashcards

1
Q

An ___ takes advantage of a system or applications vulnerability.

A

exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nmap switch option “-sA” performs ___ Scan.

A

ACK Stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The ___ ___ Act of ___ modernized US Cybercrime legislation and mandates life sentences for offenders.

A

CyberSecurity Enhancement Act of 2002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ Scan sends packets with FIN, URG, and PSH control flags set.

A

TCP Xmas Tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ is an entity that sees all messages, but is unable to modify them; is able to inject new messages.

A

Man-on-the-side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Title 18 ___ safeguards computers from fraud and related activities.

A

USC 1030

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Nmap switch option ___ is an active fingerprinting method that performs OS detection.

A

-o

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ___ is caused when applications are allowed to write beyond allocated memory due to lack of input validation.

A

buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ represents an entity that sits between systems to observe and modify data.

A

man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is used in Linux to provide interactive monitoring of active processes.

A

Top

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ is a simple offline password cracking tool found on Kali.

A

John the Ripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ is a troubleshooting tool used to determine if a host is reachable.

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ fingerprinting is also known as TCP stack fingerprinting.

A

Passive OS fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SYN ___ Scan is also known as half-open scan.

A

Stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ is used in UNIX to clean from binary files.

A

Zap3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ is a UNIX/Linux tool that can perform DNS zone transfers.

A

dig

17
Q

Title 18 USC 1029 deals with fraud and related activities in connection with ___.

A

Access Devices

18
Q

___ is used to display software package information in UNIX.

A

pkginfo

19
Q

___ is used to search inside text files for matching patterns.

A

grep

20
Q

___ is the encapsulation of data for traversing through the network.

A

tunneling

21
Q

___ is used in UNIX to provide interactive monitoring of active processes.

A

prstat

22
Q

___ is know as the “take it with you” scanner.

A

scanline

23
Q

___ displays target hosts’ NFS exported file system.

A

showmount -e

24
Q

___ displays current system information in UNIX.

A

uname -a

25
Q

___ is a technique to connect to applications to identify the version.

A

banner grabbing

26
Q

___ Scan sends packets with no control flag set.

A

TCP null

27
Q

___ describes actions taken to minimize the exploitation footprint with a target network, and remain undetected in a network.

A

tradecraft

28
Q

___ fingerprinting involves connecting to a target port and reviewing the resulting TCP packets sent as a response to identify default values.

A

Active OS

29
Q

___ is a fully functional payload that is delivered in one shot during the exploit.

A

single

30
Q

Nmap switch option “-sT” performs a ___ Scan.

A

TCP Connect

31
Q

Nmap ___ mode sends serialized scans every five minutes.

A

Paranoid (0)

32
Q

Nmap switch option “-sV” performs ___.

A

Version Detection

33
Q

Solaris vfs_getvfssw() is used to perform ___ after exploitation of a UNIX system.

A

privilege escalation

34
Q

___ - ___ rootkits exploit the function of LKM to hide below the application layer.

A

kernel-mode

35
Q

___ payload initiates a connection from the target to the handler.

A

Reverse TCP