CYBR 4330 - Week 5 Flashcards
What is the current file system that Windows utilizes that has strong security features?
NTFS
What is the current file system that Windows utilizes that has strong security features?
NTFS
What is the decimal equivalent of the binary number 11000001?
193
What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?
port
What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?
no ACL support
What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?
no ACL support
What is the passive process of finding information on a company’s network called?
footprinting
What is the specific act of checking a user’s privileges to understand if they should or should not have access to a page, field, resource, or action in an application?
authorization
What is the specific act of filtering, rejecting, or sanitizing a user’s untrusted input before the application processes it?
input validation
What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?
Application
What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?
Transport layer
What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?
Application
What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?
Internet
What name is given to people who break into computer systems with the sole purpose to steal or destroy data?
crackers
What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?
Fping
What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?
NMap
What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?
OpenVAS
What organization disseminates research documents on computer and network security worldwide at no cost?
SANS
What penetration model should a company use if they only want to allow the penetration tester(s) partial or incomplete information regarding their network system?
gray box
What penetration model should be used when a company’s management team does not wish to disclose that penetration testing is being conducted?
black box