CYBR 4330 - Week 3 Flashcards

1
Q

SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration?

A

default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

A

stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of which OSI model layer?

A

Data Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The acronym IDS stands for which of the following?

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The computer names you assign to Windows systems are called which of the following?

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The open-source descendant of Nessus is called which of the following?

A

OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The print command for Perl is almost identical to the print command used in which of the following programming languages?

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The virus signature file is maintained by what type of software?

A

antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What directions do you save the a program to on your Web server before you check the URL in your Web browser?

A

cgi-bin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used?

A

footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To determine whether a system could be vulnerable to an RPC-related issue, what tool can be used?

A

MBSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To examine the router’s routing table, a Cisco administrator would enter which command?

A

show ip route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?

A

nc -h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses?

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

UNIX was first written in assembly language. However, it was soon rewritten in what programming language?

A

Python

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

A

apt-get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

A

apt-get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Visual Basic Script (VBScript) is a scripting language developed by what companies?

A

Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What 1-pixel x 1-pixel image file is referenced in an tag, and usually works with a cookie to collect information

A

Web bug

22
Q

What 32-bit number tracks packets received by a node and allows the reassembling of large packets that have been broken up into smaller packets?

A

ISN

23
Q

What HTTP method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body?

A

HEAD

24
Q

What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?

A

127 address

25
Q

What IPv4 address class has the IP address 221.1.2.3?

A

Class C

26
Q

What TCP flag is responsible for delivering data directly and immediately to an application?

A

PSH flag

27
Q

What TCP flag is responsible for synchronizing the beginning of a session?

A

SYN flag

28
Q

What TCP/IP protocol is fast, unreliable, and operates at the Transport layer?

A

UDP

29
Q

What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?

A

ICMP

30
Q

What acronym represents the U.S. Department of Justice new branch that addresses computer crime?

A

CHIP

31
Q

What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?

A

Hping

32
Q

What application is considered the original password-cracking program and is now used by many government agencies to test for password strength?

A

L0phtcrack

33
Q

What area of a network is a major area of potential vulnerability because of the use of URLs?

A

DNS

34
Q

What boot loader will allow your computer or laptop to start in both Windows and Linux?

A

GRUB

35
Q

What common term is used by security testing professionals to describe vulnerabilities in a network?

A

holes

36
Q

What configuration mode allows a Cisco administrator to configure router settings that affect the overall operations of the router?

A

Global configuration mode

37
Q

What connection-oriented protocol is utilized by the Transport layer?

A

TCP

38
Q

What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?

A

file system

39
Q

What derogatory title do experienced hackers, who are skilled computer operators, give to inexperienced hackers?

A

script kiddies

40
Q

What does the “NBT” part of “NBTscan” stand for?

A

NetBIOS over TCP/IP

41
Q

What does the acronym TCP represent?

A

Transmission Control Protocol

42
Q

What encryption algorithm can be used for both encryption and digital signing, uses a one-way function, and is still widely used in e-commerce?

A

RSA

43
Q

What encryption algorithm is efficient requiring few resources, and is based on complex algebra and calculations on curves?

A

ECC

44
Q

What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems?

A

DumpSec

45
Q

What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?

A

SecureBoot

46
Q

What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another?

A

Windows Containers

47
Q

What federal law makes it illegal to intercept any type of communication, regardless of how it was transmitted?

A

Electronic Communication Privacy Act

48
Q

What is the 1 to 32 character configurable name used to identify a WLAN?

A

SSID

49
Q

What is the HTTP method that retrieves data by URI?

A

GET

50
Q

What is the IEEE 802 standards name for a wireless network that is limited to one person’s workspace?

A

WPAN