CYBR 4330 - Week 8 Flashcards

1
Q

standard that describes the creating of a certificate

A

X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

technique that uses a phishing e-mail to lure a user into following a malicious link

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A device that performs more than one function, such as printing and faxing is called what

A

MFD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A large organization that is responsible for sensitive or critical data may elect to create which of the following to do damage assessment, risk remediation, and legal consultation?

A

Security Operations Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Windows operating system was the first to disable null sessions by default?

A

Windows Server 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adobe System’s ColdFusion uses its proprietary tags, which are written in which of the following languages?

A

CFML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Carelessly reviewing your program’s code might result in having which of the following in your program code?

A

bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Closed ports respond to a NULL scan with what type of packet?

A

RST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Connecting to an MS SQL Server database with Microsoft’s Object Linking and Embedding Database (OLE DB) requires using what provider?

A

SQLOLEDB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which if the following?

A

ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

For a Windows computer to be able to access a *nix resource, which of the following must be enabled on both systems?

A

CIFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix?

A

254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If a Cisco administrator needs to configure a serial or Fast Ethernet port, which configuration mode should they use?

A

Interface configuration mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

If a security expert decides to study the process of breaking encryption algorithms, they are performing what?

A

cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?

A

limit their scan speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If an organization does not want to rely on a wireless device to authenticate users, which of the following is a secure alternative?

A

RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If you do not have access to Nessus, what NMap procedure can be used to help you to gain information about remote *nix hosts?

A

script scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

If you want to know what the Perl print command does, you can use what command?

A

perldoc -f print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the standard name for a team made up of security professionals?

A

red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In 802.11, what is an addressable unit?

A

station (STA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In 802.1X, what component refers specifically to the wireless user attempting access to a WLAN?

A

supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In a Linux script, which of the lines is important because it identifies the file as a script?

A

!/bin/sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In a Perl program, to go from one function to another, you simply call the function by entering which of the following in your source code?

A

name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In a normal TCP session, the sender sends a packet to another computer with which of the following flags set?

A

SYN flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be operating in what state?

A

unfiltered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In any *NIX system, after saving a script named “script_name,” you need to make it executable so that you can run it. Which command will accomplish this task from the command line?

A

chmod +x script_name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

In object-oriented programming, a function contained in a class is called which of the following?

A

member function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In the C programming language, which of the following show where a block of code begins and ends?

A

braces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

n the C programming language, which statement tells the compiler to keep doing what is in the brackets over and over and over?

A

for(;;)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In the C programming language, which variable type holds the value of a single letter?

A

Char

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

In the Perl programming language, comment lines begin with the which of the following character(s)?

A

#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

In the Perl programming language, variables begin with which of the following characters?

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

In the Perl programming language, which of the following keywords is used in front of function names?

A

sub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

In the TCP/IP stack, what layer is concerned with physically moving bits across the network’s medium?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?

A

ciphertext-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

In what type of attack does the attacker need access to the cryptosystem, and the ciphertext to be decrypted to yield the desired plaintext results?

A

chosen-ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?

A

scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?

A

HFNetChk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

NetBIOS over TCP/IP is called what in Windows Server 2003?

A

NetBT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

NetBios should be understood by a security professional because it is used for which of the following?

A

backward compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

One of the limitations when using “ping sweeps” is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?

A

reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?

A

create a contractual agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Red Hat and Fedora Linux use what command to update and manage their RPM packages?

A

yum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

A

firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?

A

air gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration?

A

default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

A

stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of which OSI model layer?

A

Data Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The acronym IDS stands for which of the following?

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

The computer names you assign to Windows systems are called which of the following?

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

The open-source descendant of Nessus is called which of the following?

A

OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

The print command for Perl is almost identical to the print command used in which of the following programming languages?

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

The virus signature file is maintained by what type of software?

A

antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What directions do you save the a program to on your Web server before you check the URL in your Web browser?

A

cgi-bin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used?

A

footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

To determine whether a system could be vulnerable to an RPC-related issue, what tool can be used?

A

MBSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

To examine the router’s routing table, a Cisco administrator would enter which command?

A

show ip route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?

A

nc -h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses?

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

UNIX was first written in assembly language. However, it was soon rewritten in what programming language?

A

Python

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

A

apt-get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

A

apt-get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Visual Basic Script (VBScript) is a scripting language developed by what companies?

A

Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What 1-pixel x 1-pixel image file is referenced in an tag, and usually works with a cookie to collect information

A

Web bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What 32-bit number tracks packets received by a node and allows the reassembling of large packets that have been broken up into smaller packets?

A

ISN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What HTTP method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body?

A

HEAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?

A

127 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What IPv4 address class has the IP address 221.1.2.3?

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What TCP flag is responsible for delivering data directly and immediately to an application?

A

PSH flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What TCP flag is responsible for synchronizing the beginning of a session?

A

SYN flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What TCP/IP protocol is fast, unreliable, and operates at the Transport layer?

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What acronym represents the U.S. Department of Justice new branch that addresses computer crime?

A

CHIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?

A

Hping

82
Q

What application is considered the original password-cracking program and is now used by many government agencies to test for password strength?

A

L0phtcrack

83
Q

What area of a network is a major area of potential vulnerability because of the use of URLs?

A

DNS

84
Q

What boot loader will allow your computer or laptop to start in both Windows and Linux?

A

GRUB

85
Q

What common term is used by security testing professionals to describe vulnerabilities in a network?

A

holes

86
Q

What configuration mode allows a Cisco administrator to configure router settings that affect the overall operations of the router?

A

Global configuration mode

87
Q

What connection-oriented protocol is utilized by the Transport layer?

A

TCP

88
Q

What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?

A

file system

89
Q

What derogatory title do experienced hackers, who are skilled computer operators, give to inexperienced hackers?

A

script kiddies

90
Q

What does the “NBT” part of “NBTscan” stand for?

A

NetBIOS over TCP/IP

91
Q

What does the acronym TCP represent?

A

Transmission Control Protocol

92
Q

What encryption algorithm can be used for both encryption and digital signing, uses a one-way function, and is still widely used in e-commerce?

A

RSA

93
Q

What encryption algorithm is efficient requiring few resources, and is based on complex algebra and calculations on curves?

A

ECC

94
Q

What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems?

A

DumpSec

95
Q

What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?

A

SecureBoot

96
Q

What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another?

A

Windows Containers

97
Q

What federal law makes it illegal to intercept any type of communication, regardless of how it was transmitted?

A

Electronic Communication Privacy Act

98
Q

What is the 1 to 32 character configurable name used to identify a WLAN?

A

SSID

99
Q

What is the HTTP method that retrieves data by URI?

A

GET

100
Q

What is the IEEE 802 standards name for a wireless network that is limited to one person’s workspace?

A

WPAN

101
Q

What is the current file system that Windows utilizes that has strong security features?

A

NTFS

102
Q

What is the current file system that Windows utilizes that has strong security features?

A

NTFS

103
Q

What is the decimal equivalent of the binary number 11000001?

A

193

104
Q

What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?

A

port

105
Q

What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?

A

no ACL support

106
Q

What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?

A

no ACL support

107
Q

What is the passive process of finding information on a company’s network called?

A

footprinting

108
Q

What is the specific act of checking a user’s privileges to understand if they should or should not have access to a page, field, resource, or action in an application?

A

authorization

109
Q

What is the specific act of filtering, rejecting, or sanitizing a user’s untrusted input before the application processes it?

A

input validation

110
Q

What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?

A

Application

111
Q

What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?

A

Transport layer

112
Q

What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?

A

Application

113
Q

What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?

A

Internet

114
Q

What name is given to people who break into computer systems with the sole purpose to steal or destroy data?

A

crackers

115
Q

What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?

A

Fping

116
Q

What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?

A

NMap

117
Q

What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?

A

OpenVAS

118
Q

What organization disseminates research documents on computer and network security worldwide at no cost?

A

SANS

119
Q

What penetration model should a company use if they only want to allow the penetration tester(s) partial or incomplete information regarding their network system?

A

gray box

120
Q

What penetration model should be used when a company’s management team does not wish to disclose that penetration testing is being conducted?

A

black box

121
Q

What penetration model would likely provide a network diagram showing all the company’s routers, switches, firewalls, and intrusion detection systems, or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?

A

white box

122
Q

What policy, provide by a typical ISP, should be read and understood before performing any port scanning outside of your private network?

A

Acceptable Use Policy

123
Q

What port does the Domain Name System, or DNS service use?

A

53

124
Q

What port does the Hypertext Transfer Protocol, or HTTP service use?

A

80

125
Q

What port does the Simple Mail Transfer Protocol, or SMTP service use?

A

25

126
Q

What port does the Trivial File Transfer Protocol, or TFTP service use?

A

69

127
Q

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?

A

443

128
Q

What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

A

enumeration

129
Q

What professional level security certification did the “International Information Systems Security Certification Consortium” (ISC2) develop?

A

Certified Information Systems Security Professional (CISSP)

130
Q

What professional level security certification requires five years of experience and is designed to focus on an applicant’s security-related managerial skills?

A

Certified Information Systems Security Professional

131
Q

What professional security certification requires applicants to demonstrate hands-on abilities to earn their certificate?

A

Offensive Security Certified Professional

132
Q

What programming languages are vulnerable to buffer overflow attacks?

A

C and C++

133
Q

What programming languages are vulnerable to buffer overflow attacks?

A

C and C++

134
Q

What protocol improves WPA encryption by adding Message Integrity Checks, Extended Initialization Vectors, Per-packet key mixing, and a Re-keying mechanism to improve encryption?

A

TKIP

135
Q

What protocol is the most widely used and allows all computers on a network to communicate and function

A

TCP/IP

136
Q

What router feature provides basic security by mapping internal private IP addresses to public external IP addresses, essentially hiding the internal infrastructure from unauthorized personnel?

A

NAT

137
Q

What security certification did the “The International Council of Electronic Commerce Consultants” (EC-Council) develop?

A

Certified Ethical Hacker (CEH)

138
Q

What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology?

A

OPST

139
Q

What security feature was extended to the OS to alert the user when an application is launched on a Windows 8.1 computer?

A

SmartScreen

140
Q

What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?

A

dumpster diving

141
Q

What specific term does the U.S. Department of Justice use to label all illegal access to computer or network systems?

A

Hacking

142
Q

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

A

domain controllers

143
Q

What specific type of spread spectrum modulation allows data to hop to other frequencies to avoid interference that might occur over a frequency band?

A

FHSS

144
Q

What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools?

A

SIEM

145
Q

What standard specifically defines the process of authenticating and authorizing users on a network?

A

802.1X

146
Q

What subject area is not one of the 22 domains tested during the CEH exam?

A

Trojan hijacking

147
Q

What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?

A

Piggybacking

148
Q

What term best describes a person who hacks computer systems for political or social reasons?

A

hacktivist

149
Q

What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?

A

Piggybacking

150
Q

What term best describes a person who hacks computer systems for political or social reasons?

A

hacktivist

151
Q

What tool can be used to read and write data to ports over a network?

A

Netcat

152
Q

What type of IDS/IPS is used to protect a critical network server or database server by installing the IDS or IPS software on the system you’re attempting to protect?

A

Host-based

153
Q

What type of IDSs/IPSs monitors activity on network segments by sniffing traffic as it flows over the network and alerting a security administrator when something suspicious occurs?

A

Network-based

154
Q

What type of Windows Server is the most likely server to be targeted by a computer hacker?

A

Domain Controller

155
Q

What type of an IDS is being used when it does not take any action to stop or prevent an activity occurring?

A

passive system

156
Q

What type of assessment performed by a penetration tester attempts to identify all the weaknesses found in an application or on a system?

A

vulnerability

157
Q

What type of attack causes the victim’s computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?

A

Ping of Death

158
Q

What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters?

A

brute force

159
Q

What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms?

A

known plaintext

160
Q

What type of attack is being performed when an attacker intercepts the initial communications between a Web server and a Web browser while forcing a vulnerable server to insecurely renegotiate the encryption being used down to a weaker cipher?

A

SSL/TLS downgrade attack

161
Q

What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?

A

chosen-plaintext

162
Q

What type of attack is occurring when an attacker places themselves between two parties and manipulates messages being passed back and forth?

A

Man-in-the-Middle

163
Q

What type of cryptography is demonstrated by reversing the alphabet so A becomes Z, B becomes Y, and so on?

A

substitution cipher

164
Q

What type of encryption is currently used to secure WPA2?

A

AES

165
Q

What type of firewall inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection firewall does?

A

application-aware firewall

166
Q

What type of function is being performed when a router screens packets based on information in the packet header?

A

router screening

167
Q

router screening

A

HTTP

168
Q

What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

A

Keyloggers

169
Q

What type of laws should a penetration tester or student learning hacking techniques be aware of?

A

local, state, and federal

170
Q

What type of malicious code could be installed in a system’s flash memory to allow an attacker to access the system at a later date?

A

BIOS-based rootkit

171
Q

What type of malicious computer programs present themselves as useful computer programs or applications?

A

Trojan programs

172
Q

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

A

eavesdropping

173
Q

What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

A

virus

174
Q

What type of modulation spreads data across a large-frequency bandwidth instead of traveling across just one frequency band?

A

Spread spectrum

175
Q

What type of network attack relies on guessing a TCP header’s initial sequence number, or ISN?

A

Session hijacking

176
Q

What type of packet filtering records session-specific information about a network connection, including the ports a client uses?

A

Stateful

177
Q

What type of port scan has the FIN, PSH, and URG flags set?

A

XMAS scan

178
Q

What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer’s OS?

A

Connect

179
Q

What type of system converts between plaintext and ciphertext?

A

cryptosystem

180
Q

What type of testing procedure involves the tester(s) analyzing the company’s security policy and procedures, and reporting any vulnerabilities to management?

A

security test

181
Q

What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS systems?

A

null session

182
Q

What type of useful tools can a security tester find available in both Firefox and Chrome Web browsers?

A

developer tools

183
Q

What type of virus is used to lock a user’s system, or cloud accounts until the system’s owner complies by paying the attacker a monetary fee?

A

ransomware

184
Q

What type of viruses and code has been created by security researchers and attackers that could infect phones running Google’s Android, Windows Mobile, and the Apple iPhone OS?

A

Java-based

185
Q

What upper-level service is required to utilize file and printer sharing in Windows?

A

Server Message Block

186
Q

What utility can be used to intercept detailed information from a company’s Web site?

A

Zed Attack Proxy

187
Q

What version of Windows Server has completely eliminated the option for telnet server?

A

Windows Server 2016

188
Q

What wireless hacking tool can perform scans for wireless access points and can set up fake APs to social-engineer users or confuse attackers using airbase-ng?

A

WiFi Pineapple

189
Q

When Web site visitors are involved in downloading malicious code without their knowledge, they may be unknowingly involved in what type of process?

A

drive-by download

190
Q

When a TCP three-way handshake ends, both parties send what type of packet to end the connection?

A

FIN

191
Q

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

A

zombies

192
Q

When a programmer exploits written code that doesn’t check for a defined amount of memory space they are executing which of the following attacks?

A

buffer overflow

193
Q

When a security professional is presented with a contract drawn up by a company’s legal department, which allows them to “hack” the company’s network, they should proceed by performing what precautionary step?

A

consult their lawyer

194
Q

When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?

A

spear phishing

195
Q

When an attacker has access to a password file, they can run a password-cracking program that uses a dictionary of known words or passwords as an input file. What type of attack is this attacker performing?

A

dictionary

196
Q

When an individual attempts to discover as much information legally possible about their competition, what information gathering technique are they performing?

A

competitive intelligence

197
Q

When hackers drive around or investigate an area with an antenna, they are usually looking for which component of a wireless network?

A

access point

198
Q

When security professionals create a packet, they may choose to specifically set which of the following fields to help initiate a response from a target computer?

A

flag

199
Q

When using a port-scanner, what procedure can be conducted to identify which IP addresses belong to active hosts?

A

ping sweep

200
Q

When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?

A

Share-level security