EH Review 1.3 Flashcards
Which Establishment Needs to be HIPAA Certified
Hospitals
Shops
Credit Card Companies
Banks
Hospitals
(HIPAA)Health Insurance Portability Accountability Act
Why may Cookies be stolen via XSS (Cross Site Scripting)
Steal another user’s session
Inject malware to the client
Deprive the server of data
Steal another users ID
Steal another user’s session
Which of the following is true regarding an SFX attack?
SFX are self-extracting executables
SFX can be used to deceive a victim into running background executables and scripts
SFX icons cannot be changed
All files extracted via SFX are visible
SFX are self-extracting executables
SFX can be used to deceive a victim into running background executables and scripts
Hashcat
Can use the GPU as the processing unit for brute-force attacks
Is considered outdated and deprecated
Can only perform brute-force using rainbow tables
Can perform fast online brute-force attacks
GPU=General Processing Unit
Graphics Processing Units are specially purposed GPUs
Can use the GPU as the processing unit for brute-force attacks
GPU=General Processing Unit
Graphics Processing Units are specially purposed GPUs
Talos
Gathers global information cyber attacks
Alerts the police if it detects suspicious network behavior
Detects all illegal traffic in an internal network
Collects other information on people
Gathers global information cyber attacks
What is the best way to mitigate unwanted pre-boot access to a windows machine?
Full disk encryption
Table Lock
BIOS Password
Implementing Password Complexity
Full disk encryption
Which SQL Attack is easiest to perform?
Blind SQLi
Error based SQLi
User based SQLi
Time based SQLi
Error based SQLi
Which of the following needs to be in the GRUB to run a terminal with root permissions?
‘rw initrd=/install/gtk/initrd.gz quiet splash init=/bin/bash’, to have read-write permissions
‘ro initrd=/bin/bash’, to run the bash terminal as root
RW initrd=/bin/bash’, to run /bin/bash as root with read-write permissions
‘rw init=/install/initrd.gz’, to run the correct image of the linux system with read-write permissions.
‘rw initrd=/install/gtk/initrd.gz quiet splash init=/bin/bash’, to have read-write permissions
Prior to beginning a test or ethical hacker work, what must you have?
Permission
Planning
Nothing
Training
Permission
Which of the following is used to perform customized network scans?
NMAP
Nessus
Wireshark
AirPcup
NMAP
NMAP scans networks, looks for IPs (Internet Protocol Addresses) that are ‘turned on/alive’, as it finds one it scans that IP for any open ports it can find
Which protocol is used to commonly perform on path attacks?
ARP
Port Security
ICMP
Subnetting
ARP
ARP= Address Resolution Protocol; found on switching fabric not routing fabric.
Switching fabric routes packets based on MAC (Media Access Controller) addresses
Routing fabric routes packets based on IP addresses
Which of the following are Hashing algorithms?
SHA-67
MD5 (obsolete, if used must also track file size; faked files are always 30% larger))
SHA-256
SHA-1 (obsolete – file size must also be tracked)
MD5 (obsolete, if used must also track file size; faked files are always 30% larger))
SHA-256
SHA-1 (obsolete – file size must also be tracked)
What are social engineering attacks based on?
Human Errors
System Bugs
Calculation Errors
Computer Error
Human Errors
What is the name of a popular exploit used in the MSF (Metasploit Framework)
Social Engineering Toolkit
Custom Payload Generation Tool
Linux CNC (Command and Control) Framework
Eternal Blue
Eternal Blue
Which of the following user types has the highest privileges in a windows domain environment?
Enterprise Admin
Domain Admin
Guest User
Delegated User
Enterprise Admin
GRUB encryption prevents which of the following?
Unwanted reboots
Half disk encryption
Editing
Full Disk Encryption
Unwanted reboots
Editing
Which of the following are server side technologies?
HTML
SQL
PHP
ASP
SQL
PHP
ASP
SQL=Structured Query Language
PHP=Pretext Hypertest Preprocessor
ASP=Active Server Pages
HTML=Hypertext Markup Language
Which of the following is false regarding XSS?
It is a client-side Attack?
It is a cracking method?
It is a scanning method?
It is a server-side attack?
It is a cracking method?
It is a scanning method?
It is a server-side attack?