Book Tests Flashcards
the greatest danger from leaving default username and passwords on devices is from ___ attacks
automated
in order to hijack a domain, the following generally needs to occur
the registration needs to lapse
when typing a url into a browser takes you to the wrong site, but typing the IP address doesn’t, then it is a case of ___
DNS poisoning
a Pixie Dust attack requires ___ to be enabled on the wireless network
WPS
a ___ scan reveals system sprawl and undocumented devices
arp (or Discovery on IPv6)
passive attack tools are defined as tools that will not ___
engage the system, or alert the target’s systems in any way
use ___ to guard against a DNS poisoning attack
DNSSEC
If a public DNS server is being used in an amplification attack, disable ___ in the server to stop it
Open Resolution
a ___ attack forces a process to load unauthorized code from a dynamically linked library
DLL injection
an ___ is the most sophisticated threat agent
Advanced Persistent Threat (APT)
to protect against ___ attacks, disable browser extensions
man in the browser
a ___ will usually eliminate vulnerability to SQL injections
Web Application Firewall (WAF)
self-signed certificates can be OK to use for ___
internal use
ASLR is a security technique that
randomizes the location of objects in memory (Address Space Layout Randomization)
another term for deauthentication attacks is ___
disassociation attacks
in a ___ spoofing attack, a local switch is fooled into directing reply traffic back to the spoofer
MAC
passive reconnaissance for pen testing can be accomplished with [nmap; Nessus; Metasploit; Aircrack]
Aircrack -ng
public certificates that can be shared are files that have the extension ___
.CRT
while rainbow tables are good at cracking complex passwords, if the password is ___ they are much less effective
salted
after a ___ attack, the attacker can typically execute any commands they wish
buffer overflow
checking the “Enable Safe Checks” on a vulnerability scanner means the scanner ___
will only use non-intrusive plugins
___ prevent the system from executing unauthorized code
Host intrusion prevention systems (HIPS)
ARP poisoning works by broadcasting a false ___, meaning the attacker must have access to the ___
MAC address; LAN
when an attacker uses a foothold in one system to access another system, this is called a ___
pivot
when a system works fine for awhile, then slows down until it is rebooted this is a symptom of a ___
memory leak
a Pass the Hash attack is only effective against a ___ server running ___
windows; NTLM
to improve the quality (and decrease false positives) of vulnerability scans, use ___ scanning
credentialed
an attack that exploits a ___ uses the timing of commands, lie the lag between Time of Check (TOC) and Time of Use (TOU)
Race Condition
a WiFi ___ is designed to carry out a rouge AP (access point) attack
Pineapple
a ___ is malware that spreads on it’s own power
worm
a misconfigured ___ could stop everyone on a network from accessing certain websites
content filter
a ___ can check the health of computers on a network without leaving permanent software on the machines
Dissolvable Network Admission Control (NAC)
an LDAP entry contains __ for domain information, ___ to identify the name and ___ to identify the organization
DC (Domain Component); CN (Common Name); OU (Organizational Unit)
Addresses in the range 169.254.0.0/16 are assigned by the ___ protocol when a system is unable to receive an address via other means.
Automatic Private IP Assignment (APIPA)
___ queries a service for header information provided to clients. This information often includes the specific service running on a port as well as version information.
Banner grabbing
___ restricts the number of unique MAC addresses that may originate from a single switch port.
Port security
___ indicates that a device is capable of acting as a host server for other devices, such as cameras, flash drives, or peripherals
USB on-the-go (USB OTG)
tracert uses ___ transport protocols by default
UDP
VPN connections established in ___ mode encrypt the payload of data packets, but do not provide encryption for packet headers
transport
Android applications must be in ___ format to sideload onto a device
Android Application Package (APK)
Encrypted LDAPS sessions use TCP port ___
636
The ___ protocol supports only authentication and integrity for IPsec connections. The ___ protocol supports confidentiality, integrity, and authentication
Authentication Headers (AH); Encapsulating Security Payload (ESP)
The ___ performs clock synchronization across devices
Network Time Protocol (NTP)
___ would limit the applications that users may install on mobile devices but would not provide for storage segmentation
Application control
When measuring RSSI, the network with the strongest signal is the one with the ___ value
highest
___ NAC leaves software running on the endpoint that may remain in constant contact with the NAC solution.
Agent-Based
the command ___ is used to capture network traffic
tcpdump
the command ___ is used to scan network ports
nmap
the command ___ is used to redirect data to a network connection
netcat
___ storage devices allow the writing of data in a permanent fashion where modification is impossible
Write once, read many (WORM)
a ___ can be used to cheaply and easily restrict network access to a small number of devices
Preshared Key (PSK)
IPsec ___ mode is primarily used for site-to-site connections, ___ mode is normally used for connections involving endpoint devices
Tunnel; Transport
When registering DNS entries for a load balanced service, administrators should assign the entry to ___
a virtual IP address that maps to the public interface of the load balancer
S/MIME provides ___, ___ and ___ for email attachments
confidentiality; integrity; non-repudiation
SNMP versions prior to ___ did not provide secure authentication due to their use of plaintext community strings
v3
when using mobile devices for multi-factor authentication, use ___ to send notices
push notification
Microsoft ___ VPN automatically triggers VPN connections based upon security policies
Always On
___ requires the explicit marking of memory regions as executable, preventing malicious attacks that seek to execute code out of other regions of memory
Data execution prevention (DEP)
The most common false positive report for application whitelisting results from ___
an unexpected update from the software vendor that changes the signature of the application
___ are traditional firewalls with advanced capabilities, including defense against application-layer attacks, such as SQL injection
Next generation firewalls (NGFW)
___ services are a form of threat intelligence that provide organizations with a frequently updated list of known malicious IP addresses that can be automatically blocked at the firewall
IP reputation
___ allow the automated modification of access point settings to adapt to the changing radio frequency environment
Wireless (WiFi) controllers