Day 3 1-38 Flashcards
3.1 You want to send various traffic to a remote host, but you’re worried that someone might monitor the link and capture the traffic. You want to tunnel the data but you do not have VPN capabilities. Which of the following tools can you use to protect the link?
A. MD5
B. PGP
C. RSA
D. SSH
D. SSH
3.2 A hacker is attempting to use nslookup to query Domain Name Service (DNS). The hacker uses the nslookup interactive mode for the search. Which command should the hacker type into the command shell to request the appropriate records?
A. Locate type=ns
B. Request type=ns
C. Set type=ns
D. Transfer type=ns
C. Set type=ns
3.3 You have been hired to perform a penetration test. You start by doing lookups on the client’s DNS servers, scanning their IP ranges, Googling for news concerning the client, staking out the client’s building to watch employee activity, looking at their job postings, and dumpster diving at the client’s office. Which stage of the penetration test does this describe?
A. Information reporting
B. Vulnerability assessment
C. Active information gathering
D. Passive information gathering
D. Passive information gathering
3.4 Bob finds out that his company will be laying him off in a few weeks and he is very angry. He places trojans, viruses, and logic bombs on his network to make his company pay for what they’re doing to him. Bob doesn’t care if he ends up in jail for 20 years because of this. What is Bob considered?
A. Bob would be considered a Suicide Hacker
B. Since he does not care about going to jail, he would be considered a Black Hat
C. Because Bob works for the company currently; he would be a White Hat
D. Bob is a Hacktivist Hacker since he is standing up to a company that is downsizing
A. Bob would be considered a Suicide Hacker
3.5 What does FIN in TCP flag define?
A. Used to abort a TCP connection abruptly
B. Used to close a TCP connection
C. Used to acknowledge receipt of a previous packet or transmission
D. Used to indicate the beginning of a TCP connection
B. Used to close a TCP connection
3.6 How could you detect IP spoofing from an outside attacker?
A. Check the IPID of the spoofed packet and compare it with TLC checksum. If the numbers match then it is spoofed packet
B. Probe a SYN Scan on the claimed host and look for a response SYN/FIN packet, if the connection completes then it is a spoofed packet
C. Turn on ‘Enable Spoofed IP Detection’ in Wireshark, you will see a flag tick if the packet is spoofed
D. Sending a packet to the claimed host will result in a reply. If the TTL in the reply is not the same as the packet being checked then it is a spoofed packet
D. Sending a packet to the claimed host will result in a reply. If the TTL in the reply is not the same as the packet being checked then it is a spoofed packet
3.7 Which method can help protect against enumeration?
A. Reject all invalid email received via SMTP.
B. Allow full DNS zone transfers.
C. Remove A records for internal hosts.
D. Enable null session pipes.
C. Remove A records for internal hosts.
3.8 Where can you go to see past versions and pages of a website?
A.Samspade.org
B.Search.com
C.Archive.org
D.AddressPast.com
C.Archive.org
3.9 Passive reconnaissance involves collecting information through which of the following?
A. Social engineering
B. Network traffic sniffing
C. Man in the middle attacks
D. Publicly accessible sources
D. Publicly accessible sources
3.10 In order to market his penetration testing skills, a consultant posts on his website several audits that he has performed in the past. Which is the most likely outcome of this?
A. The consultant will ask for money on the bid because of great work.
B. The consultant may expose vulnerabilities of other companies.
C. The company accepting bids will want the same type of format of testing.
D. The company accepting bids will hire the consultant because of the great work performed.
B. The consultant may expose vulnerabilities of other companies.
3.11 Which of these consists of a publicly available database that contains domain name registration contact information?
A. WHOIS
B. IANA
C. CAPTCHA
D. IETF
A. WHOIS
3.12 You’ve performed a penetration test for a customer, but they haven’t paid you for a long time and they keep making excuses. What should you do?
A. Threaten to publish the penetration test results if not paid.
B. Follow proper legal procedures against the company to request payment.
C. Tell other customers of the problems with payments from this company.
D. Exploit some of the vulnerabilities found on the company webserver to deface it.
3.13 What’s the first thing a penetration tester should do after being brought in to a company?
A. Begin security testing.
B. Turn over deliverables.
C. Sign a formal contract with non-disclosure.
D. Assess what the organization is trying to protect.
C. Sign a formal contract with non-disclosure.
3.14 You are a penetration tester for a large security research company. Your friend asks you to perform a penetration test and vulnerability assessment of his new company as a favor. What should you do before starting work on this job?
A. Start by foot printing the network and mapping out a plan of attack.
B. Ask your employer for authorization to perform the work outside your company.
C. Begin the reconnaissance phase with passive information gathering and then move into active information gathering.
D. Use social engineering techniques on the friend’s employees to help identify areas that may be susceptible to attack.
B. Ask your employer for authorization to perform the work outside your company.
3.15 After doing a WHOIS on your domain name, what can an attacker do if you have shared too much information about your company through these public domain records? (select TWO answers)
A. Search engines like Google and Bing will expose information listed on the WHOIS record
B. An attacker can attempt phishing and social engineering on targeted individuals using the information from WHOIS records
C. Spammers can send unsolicited e-mails to addresses listed in the WHOIS record
D. IRS Agents will use this information to track individuals using the WHOIS record information
B and C
B. An attacker can attempt phishing and social engineering on targeted individuals using the information from WHOIS records
C. Spammers can send unsolicited e-mails to addresses listed in the WHOIS record