Common Flashcards

1
Q

The _____ defines a threat is the potential cause of an incident that may result in harm of systems and organization

A

ISO 27005

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FTP Port

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Telnet Port

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ____ attack used to compromise the DNS servers to redirect all the traffic to a malicious site

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the tool that can be used to install, delete & replicate programs

A

Neosploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This attack involves eavesdropping on a network and capturing sensitive information

A

Man In The Middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?

A

TOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the length of the IPv6 datagram header?

A

40 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

valid types of IPv6 address?

A

Global Unicast , Unique Local, Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There are some programs that can be used to provide unexpected or random inputs to computer programs. This is referred to as:

A

Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In wireshark, the packet bytes pane shows the data of the current packet in which of the following format styles?

A

hex dump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Penetration testers hide Metasploit shellcode to evade Windows Defender by using which of the following Metasploit framework tools?

A

Msfencode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which device is typically used with software such as Wireshark to aid in wireless network traffic analysis?

A

AirPcap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Because of its obvious rule-breaking nature, what scan method is flagged by almost all intrusion prevention or intrusion detection systems?

A

Christmas tree scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The port numbers range from 0 to 65,535 and are split into three different groups. Registered ports are:

A

1024-49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSH Port

A

22

17
Q

SMTP Port

A

25

18
Q

DNS Port

A

TCP/UDP 53

19
Q

HTTPS Port

A

443

20
Q

POP3 Port

A

110

21
Q

Windows RPC Port

A

TCP/UDP 135

22
Q

Windows NetBIOS over TCP/IP Port

A

TCP/UDP 137-139

23
Q

Microsoft SQL Server Port

A

TCP - 1433 UDP-1434

24
Q

NetBIOS service

A

Name service for name registration and resolution (ports: 137/udp and 137/tcp)
Datagram distribution service for connectionless communication (port: 138/udp)
Session service for connection-oriented communication (port: 139/tcp)

25
Q

LDAP Port

A

TCP/UDP 389

26
Q

LDAPS Port

A

636

27
Q

LLMNR Port

A

UDP 5355

28
Q

NBT-NS Port

A

UDP 137