Hackers & Their Tools Flashcards

1
Q

What is a directed attack?

A

A network attack executed by a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 3 applications are favorite targets for application layer attacks? Why?

A

FTP
Sendmail
HTTP
Because permission levels granted to these accounts is often privileged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What should you properly configure on your anti-virus to help protect against activeX attacks?

A

The on-access component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hackers will typically use a what to attack a Mac or Unix box?

A

A Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port scans, DNS queries, ping sweeps and phishing are employed in what hacking activity?

A

Network Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe an FTP Bounce attack

A

The attacker uses the FTP PORT command to request access to ports indirectly by using the victim’s machine as a middleman.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attacker gains control of a host outside the firewall, what type of attack is this?

A

Trust-Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ATM machines and credit card swipers are tools used in what type of attack?

A

Man-In-The-Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does Banner Grabbing work?

A

An attacker connects to the device using telnet,SMTP or HTTP and generates an error to display the banner and extract useful information from it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What should you do to mitigate banner attacks?

A

Disable any service not in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is it dangerous to leave default local accounts enabled or unchanged?

A

Hackers can use them to circumvent domain authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What two steps should be carried out to mitigate misconfigured applications?

A

1) Fuzz testing and strict code reviews

2) Ensure all input validated before it is accepted by the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following steps should you take if you get a call from someone in your IT department asking for your personal information to investigation something?

A) Refuse to give it and hang up
B) Give them the information, they’re helping you out after all
C) Confirm their information and verify it with your IT dept before you give him any information

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What the name given to when of pieces of code embedded into an application that would cause a harmful effect when certain conditions are satisfied?

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What software encrypts users machines, making them unusable unless demands are met?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly