examples Flashcards
Which of the following files can be used to block the “internet archive” from making snapshots of a website?
Robots.txt
The strength of asymmetric encryption lies in the face that in addresses the most serious problem of symmetric encryption - -key distribution
True
Before launching an active security tool, a pen tester will always perform footprinting so that s/he can better plan a more effective attack
True
Which of the following is the primary goal of a penetration test?
primary goal of a penetration test is to determine whether a specific resource can be compromised
A penetration tester may be able to find organizations’ insecure applications by searching Google.
True
Because the User Datagram Protocol does not perform hand shaking like TCP does, it is harder to scan and enumerate
False
Which of the following command allows pen tester to view the arp cache of a windows system
Arp -a
which of the following best describes the concept of “port scanning” when it is performed as part of a pen test?
Identify services present on a system or range of systems.
Which of the following tools was designed to query the database that holds domain registration information and is also often used during footprinting?
Whois
- Which of the following tools was designed to query the database that holds domain registration information and is also often used during footprinting?
whois
- A penetration test does not normally require formal rules of engagement.?
false
- Which of the following statements describes one of the goals of “footprinting”?
a. Find information which is specifically designed to passively gain information about a target.
b. to gather information about a victim without
directly interacting and potentially providing advance notice of the attack.
c. Footprinting also generally focuses on gathering information externally, from outside the target organization
- What is the ultimate goal of performing enumeration on a system?
uncovering specific information about the system itself
- Which file system supports a feature called Alternate data Stream that a pen tester can use to hide files?
a. NTFS
Which of the following is a defining characteristic of an ethical hacker?
Someone who knows how hacking works and understands the dangers it poses but uses
those skills for good purposes; often known as a white-hat hacker.