Ethical Hacking 6 Flashcards

1
Q

Which penetration testing tool can discover and fix security holes and enables you to compress settings to manipulate a network or conduct a full-hammer assault?

A

FoundScan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What compiler can be used in conjunction with GCC to protect programs against stack smashing attacks?

A

StackGuard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of penetration testing is considered to be a more versatile view of the security where testing is performed from several network access points, including both logical and physical segments?

A

Internal Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A client has asked you to install a keylogger on several target systems in order to see if their anti-malware software can detect the software used. You have decided to deploy a keylogger that can be set via e-mail and utilizes executable and registry entries that can be renamed to provide some level of stealth. What keylogger should you use?

A

Spector Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recent vulnerability scans show that several web servers on your client’s network are susceptible to session hijacking. What software can be deployed to monitor sessions and act as a intrusion detection system?

A

SecureNet Pro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of security assessment is designed to evaluate an organization’s security policies and procedures?

A

Security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of testing involves the simulation of real-world attacks and minimizes false positives?

A

Black Box testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

As part of an audit of a web server utilizing Perl CGI scripts, you wish to run tests and debug running scripts locally on your computer that have been pulled from the target web server. What utility should you use?

A

OptiPerl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your ethical hacking consulting company is auditing a web server and part of the audit specifies a deliverable report on what files are present in the web serving directory that have no links leading to them in the web application’s code. What utility can you use to generate this report?

A

Link Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of a gap analysis?

A

A gap analysis evaluates the differences between an organizations vision and its current position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of black box testing involves exploring around a targeted area in a car to discover wireless networks?

A

War Driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

With what type of reconnaissance does a hacker attempt to scout for or survey potential targets then investigate the target using publicly available information?

A

Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which vulnerability assessment utility performs remote self-scans, supports API facilities, and combines with popular NMAP packages for advanced operating system fingerprinting?

A

SARA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which penetration-testing tool enables the user to identify vulnerabilities and creates 3-D maps by examining systems for responsive devices without scanning them?

A

CyberCop Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of analysis illustrates who, when, why how, and with what probability an attacker might strike a system?

A

Attack trees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

As part of network audit, you have been tasked with performing a mock Denial-of-Service attack against a target server. What are some valid means of performing this type of attack?

A

Contract out to a firm that performs mock DoS testing to purposely create large volumes of traffic directed at the target host.

Utilize hardware devices specifically designed to emulate common DoS attacks.

If an IDS is present on the network, you can simulate a DoS attack by spoofing router source addresses to trigger the IDS to cut off the network.

17
Q

Which type of security assessment scans networks for known security weaknesses?

A

Vulnerability Assessment

18
Q

What two statements accurately describe the two different types of vulnerability scanners?

A

A network-based scanner will attempt to find vulnerabilities from the outside.

A host based scanner typically requires a software agent or client to be installed.

19
Q

In an outsourced penetration test, which person will be fully aware of how the test will be conducted, the time frame involved, and the comprehensive nature of the test?

A

CutOut

20
Q

What software can be used to provide a graphical representation of VPN tunnel statuses for mobile user VPNs?

A

Watchguard