Chapter 11 Flashcards
Which step in the penetration testing life cycle is accomplished using rootkits or Trojan horse programs?
Enumeration
Gain access
Reconnaissance
Maintain access
Maintain Access
You have been hired as part of the team that manages an organization’s network defense.
Which security team are you working on?
Red
Blue
White
Purple
Blue
As part of a special program, you have discovered a vulnerability in an organization’s website and reported it to the organization. Because of the severity, you are paid a good amount of money.
Which type of penetration test are you performing?
Gray box
Bug bounty
Black box
White box
Bug Bounty
Which phase or step of a security assessment is a passive activity?
Reconnaissance
Vulnerability mapping
Enumeration
Privilege escalation
Reconnaissance
Which of the following activities are typically associated with a penetration test?
Create a performance baseline.
Attempt social engineering.
Run a vulnerability scanner on network servers.
Interview employees to verify that the security policy is being followed.
Attempt social engineering.
Which of the following is a very detailed document that defines exactly what is going to be included in the penetration test?
Goals and guidelines
Scope of work
Payment terms
Rules of engagement
Scope of work
Which of the following uses hacking techniques to proactively discover internal vulnerabilities?
Reverse engineering
Inbound scanning
Passive reconnaissance
Penetration testing
Penetration testing
What is the primary purpose of penetration testing?
Infiltrate a competitor’s network.
Assess the skill level of new IT security staff.
Evaluate newly deployed firewalls.
Test the effectiveness of your security perimeter.
Test the effectiveness of your security perimeter.
You have been hired to perform a penetration test for an organization. You are given full knowledge of the network before the test begins.
Which type of penetration test are you performing?
Black box
Bug bounty
Gray box
White box
White Box
You have been promoted to team lead of one of the security operations teams.
Which security team are you now a part of?
White
Blue
Purple
Red
White
Which of the following tools can be used to view and modify DNS server information in Linux?
dig
netstat
route
tracert
dig
You want to identify all devices on a network along with a list of open ports on those devices. You want the results displayed in a graphical diagram. Which tool should you use?
OVAL
Port scanner
Network mapper
Ping scanner
Network mapper
You need to check network connectivity from your computer to a remote computer.
Which of the following tools would be the BEST option to use?
ping
tracert
route
nmap
ping
You want to use a tool to scan a system for vulnerabilities, including open ports, running services, and missing patches. Which tool should you use?
LC4
Nessus
Wireshark
OVAL
Nessus
You need to enumerate the devices on your network and display the network’s configuration details.
Which of the following utilities should you use?
dnsenum
scanless
nmap
nslookup
nmap
Gathering as much personally identifiable information (PII) on a target as possible is a goal of which reconnaissance method?
OSINT
Passive
Active
Packet sniffing
OSINT
Which type of reconnaissance is dumpster diving?
OSINT
Packet sniffing
Active
Passive
Passive
Which passive reconnaissance tool is used to gather information from a variety of public sources?
Packet sniffing
Shodan
theHarvester
scanless
theHarvester
Which of the following tools can be used to see if a target has any online IoT devices without proper security?
theHarvester
Packet sniffing
Shodan
scanless
Shodan
The process of walking around an office building with an 802.11 signal detector is known as:
War driving
Driver signing
War dialing
Daemon dialing
War driving
You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections.
Which type of device should you use?
Anomaly-based IDS
Host-based firewall
Signature-based IDS
Antivirus scanner
Network-based firewall
Anomaly-based IDS
Which of the following describes the worst possible action by an IDS?
The system correctly deemed harmless traffic as inoffensive and let it pass.
The system detected a valid attack and the appropriate alarms and notifications were generated.
The system identified harmless traffic as offensive and generated an alarm.
The system identified harmful traffic as harmless and allowed it to pass without generating any alerts.
The system identified harmful traffic as harmless and allowed it to pass without generating any alerts.
Which of the following describes a false positive when using an IPS device?
Malicious traffic masquerading as legitimate traffic
The source address identifying a non-existent host
The source address matching the destination address
Legitimate traffic being flagged as malicious
Malicious traffic not being identified
Legitimate traffic being flagged as malicious
As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices.
You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks.
Which solution should you implement?
Host-based IDS
Port scanner
Protocol analyzer
Network-based IDS
VPN concentrator
Host-based IDS
What is the most common form of host-based IDS that employs signature or pattern-matching detection methods?
Motion detectors
Antivirus software
Firewalls
Honeypots
Antivirus software
An active IDS system often performs which of the following actions? (Select two.)
Cannot be detected on the network because it takes no detectable actions.
Updates filters to block suspect traffic.
Requests a second logon test for users performing abnormal activities.
Performs reverse lookups to identify an intruder.
Traps and delays the intruder until the authorities arrive.
Updates filters to block suspect traffic.
Performs reverse lookups to identify an intruder.
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action to stop or prevent the attack, if possible.
Which tool should you use?
Packet sniffer
IPS
Port scanner
IDS
IPS
Your organization uses a web server to host an e-commerce site.
Because this web server handles financial transactions, you are concerned that it could become a prime target for exploits. You want to implement a network security control that analyzes the contents of each packet going to or from the web server. The security control must be able to identify malicious payloads and block them.
What should you do?
Implement an application-aware IPS in front of the web server
Install an anti-malware scanner on the web server
Implement a stateful firewall in front of the web server
Implement an application-aware IDS in front of the web server
Implement a packet-filtering firewall in front of the web server
Implement an application-aware IPS in front of the web server