CYBR 4330 - Week 5 Flashcards

1
Q

What is the current file system that Windows utilizes that has strong security features?

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the current file system that Windows utilizes that has strong security features?

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the decimal equivalent of the binary number 11000001?

A

193

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?

A

port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?

A

no ACL support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?

A

no ACL support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the passive process of finding information on a company’s network called?

A

footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the specific act of checking a user’s privileges to understand if they should or should not have access to a page, field, resource, or action in an application?

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the specific act of filtering, rejecting, or sanitizing a user’s untrusted input before the application processes it?

A

input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What name is given to people who break into computer systems with the sole purpose to steal or destroy data?

A

crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?

A

Fping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?

A

NMap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?

A

OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What organization disseminates research documents on computer and network security worldwide at no cost?

A

SANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What penetration model should a company use if they only want to allow the penetration tester(s) partial or incomplete information regarding their network system?

A

gray box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What penetration model should be used when a company’s management team does not wish to disclose that penetration testing is being conducted?

A

black box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What penetration model would likely provide a network diagram showing all the company’s routers, switches, firewalls, and intrusion detection systems, or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?

22
Q

What policy, provide by a typical ISP, should be read and understood before performing any port scanning outside of your private network?

A

Acceptable Use Policy

23
Q

What port does the Domain Name System, or DNS service use?

24
Q

What port does the Hypertext Transfer Protocol, or HTTP service use?

25
What port does the Simple Mail Transfer Protocol, or SMTP service use?
25
26
What port does the Trivial File Transfer Protocol, or TFTP service use?
69
27
What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?
443
28
What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?
enumeration
29
What professional level security certification did the "International Information Systems Security Certification Consortium" (ISC2) develop?
Certified Information Systems Security Professional (CISSP)
30
What professional level security certification requires five years of experience and is designed to focus on an applicant's security-related managerial skills?
Certified Information Systems Security Professional
31
What professional security certification requires applicants to demonstrate hands-on abilities to earn their certificate?
Offensive Security Certified Professional
32
What programming languages are vulnerable to buffer overflow attacks?
C and C++
33
What programming languages are vulnerable to buffer overflow attacks?
C and C++
34
What protocol improves WPA encryption by adding Message Integrity Checks, Extended Initialization Vectors, Per-packet key mixing, and a Re-keying mechanism to improve encryption?
TKIP
35
What protocol is the most widely used and allows all computers on a network to communicate and function
TCP/IP
36
What router feature provides basic security by mapping internal private IP addresses to public external IP addresses, essentially hiding the internal infrastructure from unauthorized personnel?
NAT
37
What security certification did the "The International Council of Electronic Commerce Consultants" (EC-Council) develop?
Certified Ethical Hacker (CEH)
38
What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology?
OPST
39
What security feature was extended to the OS to alert the user when an application is launched on a Windows 8.1 computer?
SmartScreen
40
What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?
dumpster diving
41
What specific term does the U.S. Department of Justice use to label all illegal access to computer or network systems?
Hacking
42
What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?
domain controllers
43
What specific type of spread spectrum modulation allows data to hop to other frequencies to avoid interference that might occur over a frequency band?
FHSS
44
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools?
SIEM
45
What standard specifically defines the process of authenticating and authorizing users on a network?
802.1X
46
What subject area is not one of the 22 domains tested during the CEH exam?
Trojan hijacking
47
What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?
Piggybacking
48
What term best describes a person who hacks computer systems for political or social reasons?
hacktivist
49
What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?
Piggybacking
50
What term best describes a person who hacks computer systems for political or social reasons?
hacktivist