8.4.12 Practice Questions Flashcards
You believe your system has been hacked. Which of the following is the first thing you should check?
answer
Browser history
Hidden files
Modified timestamps
System log files
System log files
Listen to exam instructions
Who would be most likely to erase only parts of the system logs file?
answer
A penetration tester
The network admin
A black hat hacker
An everyday user
A black hat hacker
Phil, a hacker, has found his way into a secure system. He is looking for a Windows utility he can use to retrieve, set, back up, and restore logging policies. Which of the following utilities should he consider?
answer
gpedit
secedit
auditpol
poledit
auditpol
Which of the following could a hacker use Alternate Data Streams (ADS) for?
answer
Hiding evidence
Erasing evidence
Modifying evidence
Tracking evidence
Hiding evidence
James, a hacker, has hacked into a Unix system and wants to change the timestamps on some files to hide his tracks. Which of the following timestamp tools would he most likely use?
answer
Touch
Timestomp
ctime
Meterpreter
Touch
Which of the following best describes CCleaner?
answer
A software that can clear cookies, stored data like passwords, browser history, and temporary cached files. It can clear the recycling bin, clipboard data, and recent documents lists as well.
A program that searches for carrier files through statistical analysis techniques, scans for data hiding tools, and can crack password-protected data to extract the payload.
A tool that can remove files and clear internet browsing history. It also frees up hard disk space. It clears the temporary files, history, and cookies from each of the six major search engines.
A command line tool in Windows 2000 that will dump a remote or local event log into a tab-separated text file. It can also be used to filter specific types of events.
A tool that can remove files and clear internet browsing history. It also frees up hard disk space. It clears the temporary files, history, and cookies from each of the six major search engines.
Listen to exam instructions
Mark is moving files from a device that is formatted using NTFS to a device that is formatted using FAT. Which of the following is he trying to get rid of?
answer
Software programs that hackers use.
Antivirus and anti-spyware programs.
Encrypted steganographic information.
Malicious alternate data streams.
Malicious alternate data streams.
Which of the following best describes a rootkit?
answer
Scans the system and compares the current scan to the clean database.
Allows each file an unlimited number of data streams with unlimited size.
Allows the user to create a password to make the hidden file more secure.
Can modify the operating system and the utilities of the target system.
Can modify the operating system and the utilities of the target system.
Listen to exam instructions
Which of the following is also known as ZeroAccess and has virus, Trojan horse, and rootkit components?
answer
Sirefef
GrayFish
DeepSound
Touch
Sirefef
Listen to exam instructions
Jerry runs a tool to scan a clean system to create a database. The tool then scans the system again and compares the second scan to the clean database. Which of the following detection methods is Jerry using?
answer
Cross view-based
Integrity-based
Behavior-based
Signature-based
Integrity-based
Listen to exam instructions
Which of the following best describes the heuristic or behavior-based detection method?
answer
Runs a tool to scan a clean system and create a database, then scans the system and compares the current scan to the clean database.
Searches for execution path hooking, which allows a function value in an accessible environment to be changed.
Scans a system’s processes and executable files, looking for byte sequences of known malicious rootkit programs.
Uses an algorithm as it goes through the system files, processes, and registry keys to create a baseline that is compared to the data returned by the operating system’s APIs.
Searches for execution path hooking, which allows a function value in an accessible environment to be changed.
Listen to exam instructions
The method of embedding data into legitimate files like graphics to hide it and then extracting the data once it reaches its destination is called:
answer
NTFS data streaming
Steganography
Rootkits
Execution path profiling
Steganography
Cameron wants to send secret messages to his friend Brandon, who works at a competitor’s company. To secure these messages, he uses a technique to hide a secret message within a video. Which of the following techniques is he using?
answer
Steganography
Encryption
RSA algorithm
Public-key cryptograph
Steganography