Incorrect Answers Flashcards
What is a Cavity Virus?
A cavity virus attempts to install itself inside of the file it is infecting.
What is an Insider Affiliate
Somebody who is contracted to work for the company and through social engineering gains access from an actual employee.
What does Set type=ns do?
It uses nslookup to query Domain Name Service (DNS).
What does this command do? >host -t a hackeddomain.com
Looks for IP addresses. Perameter -t a
What is this image?
The Hacker first attempted logins with suspected user names, then used SQL Injection to gain access to valid bank login IDs.
In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code?
EIP - EIP is a register in x86 architectures (32bit). It holds the “Extended Instruction Pointer” for the stack. In other words, it tells the computer where to go next to execute the next command and controls the flow of a program.
Splint is a source code analyzer that is capable of detecting a _____
Buffer Overflow
Attackers craft malicious probe packets and scan for services such as HTTP over SSL (HTTPS), SMTP over SSL (SMPTS) and IMAP over SSL (IMAPS) to detect honeypots in a network. Which of the following condition shows the presence of a honeypot?
Ports show a particular service running but deny a three-way handshake connection
What is this 0xFFFFFFFFFFFF
A destination MAC address of a broadcast frame.
Which of the following is a characteristic of Public Key Infrastructure (PKI)?
Public-key cryptosystems distribute public-keys within digital signatures.
How will you stop web spiders from crawling certain directories on your website?
Place robots.txt file in the root of your website with listing of directories that you don’t want to be crawled
How do you ensure if the e-mail is authentic and sent from fedex.com?
Verify the digital signature attached with the mail, the fake mail will not have Digital ID at all
What is true about ICMP flood
How do you defend against DHCP Starvation attack?
Enable DHCP snooping on the switch
A covert channel is a channel that:
transfers information over, within a computer system, or network that is outside of the security policy.
Trojan horse attacks pose one of the most serious threats to computer security. Which are the easiest and most convincing ways to infect a computer?
Legitimate “shrink-wrapped” software packaged by a disgruntled employee
Which of the following types of firewalls ensures that the packets are part of the established session?
Stateful inspection firewall
Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a system. Which of the following command can be used in UNIX environment to enumerate the shared directories on a machine?
showmount
In the context of Trojans, what is the definition of a Wrapper?
A tool used to bind the Trojan with a legitimate file
You have several plain-text firewall logs that you must review to evaluate network traffic. You know that in order to do fast, efficient searches of the logs you must use regular expressions. Which command-line utility are you most likely to use?
Grep
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator’s Computer to update the router configuration. What type of an alert is this?
False Positive
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?
Screened subnet
As an Ethical Hacker you are capturing traffic from your customer network with Wireshark and you need to find and verify just SMTP traffic. What command in Wireshark will help you to find this kind of traffic?
tcp.port eq 25
Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends “many” IP packets, based on the average number of packets sent by all origins and using some thresholds. In concept, the solution developed by Bob is actually:
Just a network monitoring tool
Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system. If a scanned port is open, what happens?
The port will send a SYN
Which of the following scan only works if the operating system’s TCP/IP implementation is based on RFC 793?
NULL Scan