Deck C Prt. 2 Flashcards

1
Q

Macro Virus

A

Is Usually Targeted at Microsoft Office Products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nessus OR Qualys

A

Aare the Best Scan TOOLS to Discover Vulnerabilities on a Windows Based Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Nikto

A

Is a Tool that can be Used to Perform Comprehensive Tests against Web Servers, Including Dangerous files on CGIs. NIKTO is a Pluggable Web Server and CGI Scanner written in PERL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nmap Option

A

nmap -F is the Option that allows you to Scan Fewer Ports than the Default Scan using nmap tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nslookup

A

Norecursive update.antivirus.com Is the Command that you can use to determine if the entry is present in DNS Cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PKI (Public Key Infrastructure)

A

Is Designed to verify and Authenticate the Identity of INDIVIDUALS within the enterprise taking part in a DATA Exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password Spraying

A

Is a Technique of cracking User Accounts in which the Hacker uses a list of common Passwords from the internet compiled into a list and then feeds that list as an Argument into the Password Cracking Application. Password Spraying uses a few common passwords to Target Thousands of accounts whereas Brute Force Attack Targets few Accounts with Thousands of Different Passwords Combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Port 123

A

NTP (Network Time Protocol) UDP Port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Presentation Layer

A

Is the Layer of the OSI 7 Layers that is Responsible for Encryption and Decryption of the Message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Private IP Address

A

192.168.1.0 is a Private IP Address and will now allow the computer to Reach the Internet since the Gateway is Not Routing to a Public IP Address. Any IP Address Starting with 192.168 is a Private IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Privilege Escalation

A

Is used When the White Hat Hacker Gains control over a User Account and Attempts to acquire Access to Another Account Confidential Files and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RIPE NCC

A

Is the RIR( Regional Internet Registry) for France, Europe, West Asia, and former USSR. A RIR Oversees the Allocations and Registration of Internet Number Resources (IPv4 Addresses, IPv6 Addresses and autonomous Systems numbers) in a Specific Region.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ransomware

A

Best Control AGAINST Ransomware is to use OFFLINE Backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reconnaissance

A

Is the TIME that Hacker Spends performing RESEARCH to locate Information about a Company such as Logos, Formatting, Name of the Company, Name of the CEO, Leadership Team Etc. This is the First step in the Ethical Hacking Process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Residual Risk

A

Is the Risk that remains after the Vulnerabilities are Classified and the Countermeasures have been Deployed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure Architecture

A

Best Practice is to place a Front End Web Server in a DMZ (Demilitarized Zone) That Only Handles External Web Traffic to Prevent Hackers from Compromising the Servers.

17
Q

Smart Card

A

Is Something you have whereas PIN is Something you KNOW. Together it makes a GOOD MFA(Multi Factor Authentication)

18
Q

Synchronization By Time

A

When The Network Devices are not Synchronized by time, The Sequence of Numerous Logged Events will not match up when Correlating Logs From Various Sources.

19
Q

Tree Based Assessment

A

Is The Approach in Which Auditor Follows Different Strategies for each Component of an Environment

20
Q

Unicode Characters

A

Using UNICODE CHARACTERS Is a Very common IDS Evasion Technique in the Internet

21
Q

Vulnerability Scanner

A

Checking If the Remote HOST is Alive is the First Step Followed by Vulnerability Scanners For Scanning a Network.

22
Q

Web Server Hardening

A

LIMITS the ADMIN or Root Level Access to the minimum number of user to secure the USER Accounts on the Web Server.

23
Q

Whitelist Validation

A

Is a Defensive Technique that Attempts to Check that a Given DATA Matches a set of Known Rules. EXAMPLE a Whitelist Validation Rule for a US State Would be a 2-Letter Code that is only one of the valid US States. It ENSURES that only a List of ENTITIES such as the Data Type, Range, Size, and Value, Which have been approved for Secured Access is Accepted.

24
Q

Wireless Network Assessment

A

Helps Identify Unusual Wireless Traffic in the Internal Network Generated by a Rouge Access Point that is aimed to cracking the Authentication Mechanism.

25
Q

Wireless Packet Sniffer

A

WHEN a Wireless Packet Sniffer SHOWS that the WAP(Wireless Access Point) is not Responding to the Association Requests being Sent by the wireless client, it means the WAP does not Recognize the Client’s MAC Address.