Day 3 76-114 Flashcards
3.76 Bob wants to search for a website title of “intranet” with part of the URL containing the word “intranet” and the words “human resources” somewhere in the webpage.
What Google search will accomplish this?
A. related:intranet allinurl:intranet:”human resources”
B. cache:”human resources” inurl:intranet(SharePoint)
C. intitle:intranet inurl:intranet+intext:”human resources”
D. site:”human resources”+intext:intranet intitle:intranet
C. intitle:intranet inurl:intranet+intext:”human resources”
3.77 Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Servers.
A. true
B. false
A. true
3.78 Why do attackers use proxy servers?
A. To ensure the exploits used in the attacks always flip reverse vectors
B. Faster bandwidth performance and increase in attack speed
C. Interrupt the remote victim’s network traffic and reroute the packets to attackers machine
D. To hide the source IP address so that an attacker can hack without any legal consequences
D. To hide the source IP address so that an attacker can hack without any legal consequences
3.79 Which of the following settings enables Nessus to detect when it is sending too many packets and the network pipe is approaching capacity?
A. Netstat WMI Scan
B. Silent Dependencies
C. Consider unscanned ports as closed
D. Reduce parallel connections on congestion
D. Reduce parallel connections on congestion
- 80 Which results will be returned with the following Google search query?
site: target.com -site:Marketing.target.com accounting
A. Results matching all words in the query
B. Results matching “accounting” in domain target.com but not on the site Marketing.target.com
C. Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting
D. Results for matches on target.com and Marketing.target.com that include the word “accounting”
B. Results matching “accounting” in domain target.com but not on the site Marketing.target.com
3.81 What happens when you do a TCP XMAS scan against an open port on a remote system?
A. The port will send an RST
B. The port will send an ACK
C. The port will send a SYN
D. The port will ignore the packet
D. The port will ignore the packet
3.82 What is the Shellshock bash vulnerability attempting to do on an vulnerable Linux host?
env x=(){ :;};echo exploit
bash -c ‘cat /etc/passwd’
A. Changes all passwords in passwd
B. Display passwd content to prompt
C. Removes the passwd file
D. Add new user to the passwd file
B. Display passwd content to prompt
3.83 What file does an attacker need to modify if he wants you to go to a phishing site when you type www.paypal.com into your web-browser?
A. Networks
B. Boot.ini
C. Sudoers
D. Hosts
D. Hosts
3.84 What should you do if a client prospect wants to see reports from your previous pen-tests?
A. Share full reports, not redacted
B. Share full reports with redactions
C. Share reports, after NDA is signed
D. Decline, but provide references
D. Decline, but provide references
3.85 Your IP address is 192.168.1.10. Which nmap command will let you enumerate all machines on the same network quickly?
A. Nmap –T4 –q 192.168.1.0/24
B. Nmap –T4 –O 192.168.1.0/24
C. Nmap –T4 –F 192.168.1.0/24
D. Nmap –T4 –r 192.168.0.0/24
C. Nmap –T4 –F 192.168.1.0/24
3.86 Which software testing technique sends random data to a program in an attempt to crash it?
A. Randomizing
B. Fuzzing
C. Bounding
D. Mutating
B. Fuzzing
3.87 After being hired to do a pen-test, you and the customer fill out a document that describes all the details of the test. This document protects both the customer as well as your legal liabilities as the tester. Which document is being described?
A. Project scope
B. Service Level Agreement
C. Terms of engagement
D. Non-Disclosure Agreement
C. Terms of engagement
3.88 What is it called when you have one DNS server on your LAN for employees, and another DNS server in your DMZ for outside access?
A. DNSSEC
B. DNS Scheme
C. DynDNS
D. Split DNS
D. Split DNS
3.89 What should you do if during a pen-test you discover information on the network that implies the client is involved with human trafficking?
A. Copy the data to removable media and keep it in case you need it
B. Ignore the data and continue the assessment until completed as agreed
C. Confront the client in a respectful manner and ask her about the data
D. Immediately stop work and contact the proper legal authorities
E. Go all “Rambo” on the client and free the prisoners immediately.
D. Immediately stop work and contact the proper legal authorities
3.90 Which best describes white-box testing?
A. The internal operation of a system is only partly accessible to the tester
B. The internal operation of a system is completely known to the tester
C. Only the internal operation of a system is known to the tester
D. Only the external operation of a system is accessible to the tester
B. The internal operation of a system is completely known to the tester