Final Flashcards

1
Q

Penetration testing can create ethical, technical, and privacy concerns for a company’s management team. What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?

A

create a contractual agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What professional level security certification did the “International Information Systems Security Certification Consortium” (ISC2) develop?

A

Certified Information Systems Security Professional (CISSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What name is given to people who break into computer systems with the sole purpose to steal or destroy data?

A

Crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What organization disseminates research documents on computer and network security worldwide at no cost?

A

SANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology?

A

OPST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What port does the Simple Mail Transfer Protocol, or SMTP service use?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To retrieve e-mail from a mail server, you most likely access port 119.
TRUE OR FALSE

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An octal digit can be represented with only three bits because the largest digit in octal is seven.
TRUE OR FALSE

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that doesn’t check for a defined amount of memory space use.
TRUE OR FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of attack is occurring when an attacker places themselves between two parties and manipulates messages being passed back and forth?

A

Man-in-the-Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

A

signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?

A

Dumpster driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?

A

nc -h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the passive process of finding information on a company’s network called?

A

Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What HTTP method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body?

A

HEAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When an individual attempts to discover as much information legally possible about their competition, what information gathering technique are they performing?

A

Competitive intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When a TCP three-way handshake ends, both parties send what type of packet to end the connection?

A

FIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In a NULL scan, all packet flags are turned on.

TRUE OR FALSE

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Attackers typically use ACK scans to get past a firewall or other filtering devices.

TRUE OR FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In any *NIX system, after saving a script named “script_name,” you need to make it executable so that you can run it. Which command will accomplish this task from the command line?

A

chmod +x script_name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which vi command deletes the current line?

A

Dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Windows Server 2012 introduced what protection feature to prevent pass-the-hash attacks?

A

Authentication Silos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS systems?

A

null session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems?

A

DumpSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration?

A

default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration?

A

default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

A

enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is a markup language rather than a programming language?

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following logical operators in the C programming language is evaluated as true if both sides of the operator are true?

A

&&

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Security professionals often need to examine Web pages and recognize when something looks suspicious.
TRUE OR FALSE

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

In the C programming language, which of the following show where a block of code begins and ends?

A

braces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following is the act of performing a task over and over?

A

Looping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later?

A

Common Internet File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following is considered to be the most critical SQL vulnerability?

A

null SA password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Red Hat and Fedora Linux use what command to update and manage their RPM packages?

A

yum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following is an interprocess communication mechanism that allows a program running on one host to run code on a remote host?

A

RPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?

A

HFNetChk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?

A

air gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

A

firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which of the following systems should be used when equipment monitoring and automation is critical?

A

SCADA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?

A

Windows CE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Connecting to an MS SQL Server database with Microsoft’s Object Linking and Embedding Database (OLE DB) requires using which of the following providers?

A

SQLOLEDB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following resources is an excellent starting point for security professionals when investigating VBScript vulnerabilities?

A

Microsoft Security Bulletin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What type of useful tools can a security tester find available in both Firefox and Chrome Web browsers?

A

developer tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which of the following cross-site scripting vulnerabilities types is especially harmful because it can be delivered to subsequent users of the application?

A

stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Web applications written in CFML can also contain other client-side technologies, such as HTML and JavaScript.
TRUE or FALSE

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology?

A

OPST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

When a security professional is presented with a contract drawn up by a company’s legal department, which allows them to “hack” the company’s network, they should proceed by performing what precautionary step?

A

consult their lawyer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What common term is used by security testing professionals to describe vulnerabilities in a network?

A

holes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Port scanning is a noninvasive, nondestructive, and legal testing procedure that is protected by federal law.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

An ethical hacker is a person who performs most of the same activities a hacker does, but with the owner or company’s permission.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What IPv4 address class has the IP address 221.1.2.3?

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What TCP flag is responsible for synchronizing the beginning of a session?

A

SYN flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What port does the Trivial File Transfer Protocol, or TFTP service use?

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What port does the Hypertext Transfer Protocol, or HTTP service use?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What type of attack causes the victim’s computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?

A

Ping of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Whitelisting allows only approved programs to run on a computer.

A

True

64
Q

What type of virus is used to lock a user’s system, or cloud accounts until the system’s owner complies by paying the attacker a monetary fee?

A

ransomware

65
Q

Malware is malicious software, such as a virus, worm, or Trojan program, introduced into a network.

A

True

66
Q

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

A

denial-of-service

67
Q

Which utility can extract meta-data and documents on a Website to reveal the document creator’s network login, e-mail
address, IP address, and other important information?

A

FOCA

68
Q

When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?

A

spear phishing

69
Q

Which process utilizes the knowledge of human nature to get information from people to use for executing an attack on a computer network?

A

social engineering

70
Q

Which HTTP method starts a remote Application-layer loopback of the request message?

A

TRACE

71
Q

What is the passive process of finding information on a company’s network called?

A

footprinting

72
Q

Closed ports respond to a NULL scan with what type of packet?

A

RST

73
Q

Which vi command deletes the current line?

A

Dd

74
Q

In a Linux script, which of the lines is important because it identifies the file as a script?

A

!/bin/sc

75
Q

To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses?

A

ping

76
Q

Attackers typically use ACK scans to get past a firewall or other filtering devices. TRUE or FALSE

A

True

77
Q

Which of the following is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas?

A

Hyena

78
Q

Which of the following commands is a powerful enumeration tool included with Windows?

A

Nbtstat

79
Q

A NetBIOS name does not need to be unique on a network.

A

False

80
Q

What does the “NBT” part of “NBTscan” stand for?

A

NetBIOS over TCP/IP

81
Q

What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another?

A

Windows Containers

82
Q

In a Perl program, to go from one function to another, you simply call the function by entering which of the following in your source code?

A

name

83
Q

Which of the following mathematical operators in the C programming language increments the unary value by 1?

A

++

84
Q

In HTML, each tag has a matching closing tag that is written with which of the following characters?

A

forward slash (/)

85
Q

Which of the following special characters is used with the printf() function in the C programming language to indicate a new line?

A

\n

86
Q

Which of the following logical operators in the C programming language is used to compare the equality of two variables?

A

==

87
Q

Which of the following is a Window’s client/server technology designed to manage patching and updating systems software from the network?

A

WSUS

88
Q

What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?

A

no ACL support

89
Q

Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs.

A

True

90
Q

Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?

A

HFNetChk

91
Q

What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?

A

file system

92
Q

When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?

A

User-level security

93
Q

What is the current file system that Windows utilizes that has strong security features?

A

NTFS

94
Q

When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?

A

Share-level security

95
Q

A device that performs more than one function, such as printing and faxing is called which of the following?

A

MFD

96
Q

Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?

A

Windows CE

97
Q

Which JavaScript function is a “method” or sequence of statements that perform a routine or task?

A

getElementById()

98
Q

Adobe System’s ColdFusion uses its proprietary tags, which are written in which of the following languages?

A

CFML

99
Q

Connecting to an MS SQL Server database with Microsoft’s Object Linking and Embedding Database (OLE DB) requires using which of the following providers?

A

SQLOLEDB

100
Q

Which of the following interfaces, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system (DBMS)?

A

OLE DB

101
Q

To check whether a CGI program works, you can test the URL in your Web browser. Which of the following directories should you save the program to on your Web server before you check the URL in your Web browser?

A

cgi-bin

102
Q

What type of assessment performed by a penetration tester attempts to identify all the weaknesses found in an application or on a system?

A

vulnerability

103
Q

What professional level security certification did the “International Information Systems Security Certification Consortium” (ISC2) develop?

A

Certified Information Systems Security Professional (CISSP)

104
Q

What subject area is not one of the 22 domains tested during the CEH exam?

A

Trojan hijacking

105
Q

What term best describes a person who hacks computer systems for political or social reasons?

A

hacktivist

106
Q

What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology?

A

OPST

107
Q

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?

A

443

108
Q

What TCP flag is responsible for delivering data directly and immediately to an application?

A

PSH flag

109
Q

What connection-oriented protocol is utilized by the Transport layer?

A

TCP

110
Q

What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?

A

Application

111
Q

What port does the Simple Mail Transfer Protocol, or SMTP service use?

A

25

112
Q

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

A

zombies

113
Q

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

A

Network security

114
Q

Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

A

heuristics

115
Q

Malware programs cannot be detected by antivirus programs. TRUE or FALSE

A

False

116
Q

Which of the following is created after an attack and usually hides within the OS tools, so it is almost impossible to detect?

A

rootkit

117
Q

Which HTTP method requests that the entity is stored under the Request-URI?

A

PUT

118
Q

What type of general commands allow a security tester to pull information from a Web server using a web browser?

A

HTTP

119
Q

Which process enables you to see all the host computers on a network and basically give you a diagram of an organization’s network?

A

zone transfers

120
Q

Network attacks can often begin by gathering information from a company’s Web site.

A

True

121
Q

Namedroppers is a tool that can be used to capture Web server information and vulnerabilities in a Web site’s pages that could allow exploits such as SQL injection and buffer overflows. TRUE or FALSE

A

False

122
Q

Attackers typically use ACK scans to get past a firewall or other filtering devices. TRUE or FALSE

A

True

123
Q

In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be operating in what state?

A

unfiltered

124
Q

One of the limitations when using “ping sweeps” is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?

A

reply

125
Q

An open port allows access to specific applications and cannot be vulnerable to attack.

A

False

126
Q

In a NULL scan, all packet flags are turned on.

A

False

127
Q

All of the enumeration techniques that work with older Windows OSs still work with Windows Server 2012.

A

False

128
Q

The open-source descendant of Nessus is called which of the following?

A

OpenVAS

129
Q

What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

A

enumeration

130
Q

What security feature was extended to the OS to alert the user when an application is launched on a Windows 8.1 computer?

A

SmartScreen

131
Q

What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems?

A

DumpSec

132
Q

Carelessly reviewing your program’s code might result in having which of the following in your program code?

A

bug

133
Q

In the Perl programming language, comment lines begin with the which of the following character(s)?

A

#

134
Q

If you want to know what the Perl print command does, you can use which of the following commands?

A

perldoc -f print

135
Q

When a compiler finds errors, it usually indicates what they are so you can correct the code and compile the program again. TRUE or FALSE

A

True

136
Q

In the C programming language, which statement tells the compiler to keep doing what is in the brackets over and over and over?

A

for(;;)

137
Q

Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?

A

HFNetChk

138
Q

What is the current file system that Windows utilizes that has strong security features?

A

NTFS

139
Q

The MSBA tool can quickly identify missing patches and misconfigurations TRUE or FALSE

A

True

140
Q

Which of the following Window’s utilities includes a suite of tools to help administrators deploy and manage servers and even allows for administrators to control mobile devices running Android, iOS, and Windows Mobile OS?

A

SCCM

141
Q

Which of the following is an open-source implementation of CIFS?

A

Samba

142
Q

Which of the following if often found within an embedded OS that can cause a potential vulnerability to an attack?

A

Web server

143
Q

What programming languages are vulnerable to buffer overflow attacks?

A

C and C++

144
Q

Which of the following systems should be used when equipment monitoring and automation is critical?

A

SCADA

145
Q

Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?

A

Windows CE

146
Q

Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?

A

Mandatory Access Control

147
Q

JavaScript is a server-side scripting language that is embedded in an HTML Web page.
TRUE or FALSE

A

False

148
Q

Which of the following interfaces is a standard database access method, developed by SQL Access Group, that allows an application to access data stored in a database management system (DBMS)?

A

ODBC

149
Q

What is the specific act of filtering, rejecting, or sanitizing a user’s untrusted input before the application processes it?

A

input validation

150
Q

What type of useful tools can a security tester find available in both Firefox and Chrome Web browsers?

A

Developer tools

151
Q

Which of the following is a programming interface for connecting a Web application to a database and defines technologies that allow applications, such as Word or Excel, to interact with the Web?

A

ADO

152
Q

What organization disseminate research documents on computer and network security worldwide at no cost?

A

SANS

153
Q

What layer protocols operate as the front end to the lower layer protocols in the TCP/IP stack? 

A

Application

154
Q

What IP address is used as a loop back address and is not a valid IP address that can be assigned to a network?

A

127 address

155
Q

What layer, and the TCP/IP Protocol stack, is responsible for encapsulating data and two segments?

A

Transport layer

156
Q

Whixh HTTP Method is used with a proxy that can dynamically switch to a tunnel connection, such as secure socket layer SSL?

A

CONNECT

157
Q

which HTTP method starts a remote application layer loop back of the request message?

A

TRACE