CYBR 4330 - Week 5 Flashcards

1
Q

What is the current file system that Windows utilizes that has strong security features?

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the current file system that Windows utilizes that has strong security features?

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the decimal equivalent of the binary number 11000001?

A

193

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?

A

port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?

A

no ACL support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?

A

no ACL support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the passive process of finding information on a company’s network called?

A

footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the specific act of checking a user’s privileges to understand if they should or should not have access to a page, field, resource, or action in an application?

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the specific act of filtering, rejecting, or sanitizing a user’s untrusted input before the application processes it?

A

input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What name is given to people who break into computer systems with the sole purpose to steal or destroy data?

A

crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?

A

Fping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?

A

NMap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?

A

OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What organization disseminates research documents on computer and network security worldwide at no cost?

A

SANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What penetration model should a company use if they only want to allow the penetration tester(s) partial or incomplete information regarding their network system?

A

gray box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What penetration model should be used when a company’s management team does not wish to disclose that penetration testing is being conducted?

A

black box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What penetration model would likely provide a network diagram showing all the company’s routers, switches, firewalls, and intrusion detection systems, or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?

A

white box

22
Q

What policy, provide by a typical ISP, should be read and understood before performing any port scanning outside of your private network?

A

Acceptable Use Policy

23
Q

What port does the Domain Name System, or DNS service use?

A

53

24
Q

What port does the Hypertext Transfer Protocol, or HTTP service use?

A

80

25
Q

What port does the Simple Mail Transfer Protocol, or SMTP service use?

A

25

26
Q

What port does the Trivial File Transfer Protocol, or TFTP service use?

A

69

27
Q

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?

A

443

28
Q

What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

A

enumeration

29
Q

What professional level security certification did the “International Information Systems Security Certification Consortium” (ISC2) develop?

A

Certified Information Systems Security Professional (CISSP)

30
Q

What professional level security certification requires five years of experience and is designed to focus on an applicant’s security-related managerial skills?

A

Certified Information Systems Security Professional

31
Q

What professional security certification requires applicants to demonstrate hands-on abilities to earn their certificate?

A

Offensive Security Certified Professional

32
Q

What programming languages are vulnerable to buffer overflow attacks?

A

C and C++

33
Q

What programming languages are vulnerable to buffer overflow attacks?

A

C and C++

34
Q

What protocol improves WPA encryption by adding Message Integrity Checks, Extended Initialization Vectors, Per-packet key mixing, and a Re-keying mechanism to improve encryption?

A

TKIP

35
Q

What protocol is the most widely used and allows all computers on a network to communicate and function

A

TCP/IP

36
Q

What router feature provides basic security by mapping internal private IP addresses to public external IP addresses, essentially hiding the internal infrastructure from unauthorized personnel?

A

NAT

37
Q

What security certification did the “The International Council of Electronic Commerce Consultants” (EC-Council) develop?

A

Certified Ethical Hacker (CEH)

38
Q

What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology?

A

OPST

39
Q

What security feature was extended to the OS to alert the user when an application is launched on a Windows 8.1 computer?

A

SmartScreen

40
Q

What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?

A

dumpster diving

41
Q

What specific term does the U.S. Department of Justice use to label all illegal access to computer or network systems?

A

Hacking

42
Q

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

A

domain controllers

43
Q

What specific type of spread spectrum modulation allows data to hop to other frequencies to avoid interference that might occur over a frequency band?

A

FHSS

44
Q

What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools?

A

SIEM

45
Q

What standard specifically defines the process of authenticating and authorizing users on a network?

A

802.1X

46
Q

What subject area is not one of the 22 domains tested during the CEH exam?

A

Trojan hijacking

47
Q

What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?

A

Piggybacking

48
Q

What term best describes a person who hacks computer systems for political or social reasons?

A

hacktivist

49
Q

What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?

A

Piggybacking

50
Q

What term best describes a person who hacks computer systems for political or social reasons?

A

hacktivist