CYBR 4330 - Week 3 Flashcards
SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?
TCP/IP
SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration?
default
Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?
stealth
The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of which OSI model layer?
Data Link layer
The acronym IDS stands for which of the following?
Intrusion Detection System
The computer names you assign to Windows systems are called which of the following?
NetBIOS
The open-source descendant of Nessus is called which of the following?
OpenVAS
The print command for Perl is almost identical to the print command used in which of the following programming languages?
C
The virus signature file is maintained by what type of software?
antivirus
What directions do you save the a program to on your Web server before you check the URL in your Web browser?
cgi-bin
To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used?
footprinting
To determine whether a system could be vulnerable to an RPC-related issue, what tool can be used?
MBSA
To examine the router’s routing table, a Cisco administrator would enter which command?
show ip route
To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?
nc -h
To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses?
ping
Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?
backdoor
UNIX was first written in assembly language. However, it was soon rewritten in what programming language?
Python
Ubuntu and Debian Linux use what command to update and manage their RPM packages?
apt-get
Ubuntu and Debian Linux use what command to update and manage their RPM packages?
apt-get
Visual Basic Script (VBScript) is a scripting language developed by what companies?
Microsoft