Common Flashcards
The _____ defines a threat is the potential cause of an incident that may result in harm of systems and organization
ISO 27005
FTP Port
21
Telnet Port
23
The ____ attack used to compromise the DNS servers to redirect all the traffic to a malicious site
Pharming
Name the tool that can be used to install, delete & replicate programs
Neosploit
This attack involves eavesdropping on a network and capturing sensitive information
Man In The Middle attack
In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
TOS
What is the length of the IPv6 datagram header?
40 bytes
valid types of IPv6 address?
Global Unicast , Unique Local, Multicast
There are some programs that can be used to provide unexpected or random inputs to computer programs. This is referred to as:
Fuzzing
In wireshark, the packet bytes pane shows the data of the current packet in which of the following format styles?
hex dump
Penetration testers hide Metasploit shellcode to evade Windows Defender by using which of the following Metasploit framework tools?
Msfencode
Which device is typically used with software such as Wireshark to aid in wireless network traffic analysis?
AirPcap
Because of its obvious rule-breaking nature, what scan method is flagged by almost all intrusion prevention or intrusion detection systems?
Christmas tree scan
The port numbers range from 0 to 65,535 and are split into three different groups. Registered ports are:
1024-49151