CYBR 4330 - Week 1 Flashcards

1
Q

standard that describes the creating of a certificate

A

X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

technique that uses a phishing e-mail to lure a user into following a malicious link

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A device that performs more than one function, such as printing and faxing is called what

A

MFD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A large organization that is responsible for sensitive or critical data may elect to create which of the following to do damage assessment, risk remediation, and legal consultation?

A

Security Operations Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Windows operating system was the first to disable null sessions by default?

A

Windows Server 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adobe System’s ColdFusion uses its proprietary tags, which are written in which of the following languages?

A

CFML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Carelessly reviewing your program’s code might result in having which of the following in your program code?

A

bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Closed ports respond to a NULL scan with what type of packet?

A

RST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Connecting to an MS SQL Server database with Microsoft’s Object Linking and Embedding Database (OLE DB) requires using what provider?

A

SQLOLEDB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which if the following?

A

ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

For a Windows computer to be able to access a *nix resource, which of the following must be enabled on both systems?

A

CIFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix?

A

254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If a Cisco administrator needs to configure a serial or Fast Ethernet port, which configuration mode should they use?

A

Interface configuration mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If a security expert decides to study the process of breaking encryption algorithms, they are performing what?

A

cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?

A

limit their scan speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If an organization does not want to rely on a wireless device to authenticate users, which of the following is a secure alternative?

A

RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If you do not have access to Nessus, what NMap procedure can be used to help you to gain information about remote *nix hosts?

A

script scanning

22
Q

If you want to know what the Perl print command does, you can use what command?

A

perldoc -f print

23
Q

What is the standard name for a team made up of security professionals?

A

red team

24
Q

In 802.11, what is an addressable unit?

A

station (STA)

25
Q

In 802.1X, what component refers specifically to the wireless user attempting access to a WLAN?

A

supplicant

26
Q

In a Linux script, which of the lines is important because it identifies the file as a script?

A

!/bin/sh

27
Q

In a Perl program, to go from one function to another, you simply call the function by entering which of the following in your source code?

A

name

28
Q

In a normal TCP session, the sender sends a packet to another computer with which of the following flags set?

A

SYN flag

29
Q

In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be operating in what state?

A

unfiltered

30
Q

In any *NIX system, after saving a script named “script_name,” you need to make it executable so that you can run it. Which command will accomplish this task from the command line?

A

chmod +x script_name

31
Q

In object-oriented programming, a function contained in a class is called which of the following?

A

member function

32
Q

In the C programming language, which of the following show where a block of code begins and ends?

A

braces

33
Q

n the C programming language, which statement tells the compiler to keep doing what is in the brackets over and over and over?

A

for(;;)

34
Q

In the C programming language, which variable type holds the value of a single letter?

A

Char

35
Q

In the Perl programming language, comment lines begin with the which of the following character(s)?

A

#

36
Q

In the Perl programming language, variables begin with which of the following characters?

A

$

37
Q

In the Perl programming language, which of the following keywords is used in front of function names?

A

sub

38
Q

In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?

A

Transport

39
Q

In the TCP/IP stack, what layer is concerned with physically moving bits across the network’s medium?

A

Network

40
Q

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?

A

ciphertext-only

41
Q

In what type of attack does the attacker need access to the cryptosystem, and the ciphertext to be decrypted to yield the desired plaintext results?

A

chosen-ciphertext

42
Q

Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?

A

scripts

43
Q

Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?

A

HFNetChk

44
Q

NetBIOS over TCP/IP is called what in Windows Server 2003?

A

NetBT

45
Q

NetBios should be understood by a security professional because it is used for which of the following?

A

backward compatibility

46
Q

One of the limitations when using “ping sweeps” is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?

A

reply

47
Q

What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?

A

create a contractual agreement

48
Q

Red Hat and Fedora Linux use what command to update and manage their RPM packages?

A

yum

49
Q

Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

A

firmware

50
Q

SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?

A

air gap