Final Flashcards
Penetration testing can create ethical, technical, and privacy concerns for a company’s management team. What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?
create a contractual agreement
What professional level security certification did the “International Information Systems Security Certification Consortium” (ISC2) develop?
Certified Information Systems Security Professional (CISSP)
What name is given to people who break into computer systems with the sole purpose to steal or destroy data?
Crackers
What organization disseminates research documents on computer and network security worldwide at no cost?
SANS
What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology?
OPST
What port does the Simple Mail Transfer Protocol, or SMTP service use?
25
What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?
Transport Layer
To retrieve e-mail from a mail server, you most likely access port 119.
TRUE OR FALSE
False
In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?
Transport
An octal digit can be represented with only three bits because the largest digit in octal is seven.
TRUE OR FALSE
True
A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?
worm
In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that doesn’t check for a defined amount of memory space use.
TRUE OR FALSE
TRUE
What type of attack is occurring when an attacker places themselves between two parties and manipulates messages being passed back and forth?
Man-in-the-Middle
Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?
signatures
What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?
Virus
What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?
Dumpster driving
To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?
nc -h
What is the passive process of finding information on a company’s network called?
Footprinting
What HTTP method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body?
HEAD
When an individual attempts to discover as much information legally possible about their competition, what information gathering technique are they performing?
Competitive intelligence
When a TCP three-way handshake ends, both parties send what type of packet to end the connection?
FIN
In a NULL scan, all packet flags are turned on.
TRUE OR FALSE
FALSE
Attackers typically use ACK scans to get past a firewall or other filtering devices.
TRUE OR FALSE
TRUE
In any *NIX system, after saving a script named “script_name,” you need to make it executable so that you can run it. Which command will accomplish this task from the command line?
chmod +x script_name
Which vi command deletes the current line?
Dd
Windows Server 2012 introduced what protection feature to prevent pass-the-hash attacks?
Authentication Silos
What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS systems?
null session
What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems?
DumpSec
SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration?
default
SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration?
default
What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?
enumeration
Which of the following is a markup language rather than a programming language?
HTML
Which of the following logical operators in the C programming language is evaluated as true if both sides of the operator are true?
&&
Security professionals often need to examine Web pages and recognize when something looks suspicious.
TRUE OR FALSE
True
In the C programming language, which of the following show where a block of code begins and ends?
braces
Which of the following is the act of performing a task over and over?
Looping
Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later?
Common Internet File System
Which of the following is considered to be the most critical SQL vulnerability?
null SA password
Red Hat and Fedora Linux use what command to update and manage their RPM packages?
yum
Which of the following is an interprocess communication mechanism that allows a program running on one host to run code on a remote host?
RPC
Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?
HFNetChk
SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?
air gap
Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs.
true
Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?
firmware
Which of the following systems should be used when equipment monitoring and automation is critical?
SCADA
Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?
Windows CE
Connecting to an MS SQL Server database with Microsoft’s Object Linking and Embedding Database (OLE DB) requires using which of the following providers?
SQLOLEDB
Which of the following resources is an excellent starting point for security professionals when investigating VBScript vulnerabilities?
Microsoft Security Bulletin
What type of useful tools can a security tester find available in both Firefox and Chrome Web browsers?
developer tools
Which of the following cross-site scripting vulnerabilities types is especially harmful because it can be delivered to subsequent users of the application?
stored
Web applications written in CFML can also contain other client-side technologies, such as HTML and JavaScript.
TRUE or FALSE
True
What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology?
OPST
When a security professional is presented with a contract drawn up by a company’s legal department, which allows them to “hack” the company’s network, they should proceed by performing what precautionary step?
consult their lawyer
What common term is used by security testing professionals to describe vulnerabilities in a network?
holes
Port scanning is a noninvasive, nondestructive, and legal testing procedure that is protected by federal law.
False
An ethical hacker is a person who performs most of the same activities a hacker does, but with the owner or company’s permission.
True
What IPv4 address class has the IP address 221.1.2.3?
Class C
What TCP flag is responsible for synchronizing the beginning of a session?
SYN flag
What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?
443
What port does the Trivial File Transfer Protocol, or TFTP service use?
69
What port does the Hypertext Transfer Protocol, or HTTP service use?
80
What type of attack causes the victim’s computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?
Ping of Death