IS3440 CHAP 13 TESTING AND REPORTING Flashcards

1
Q

COMMAND ___ is a command on Ubuntu and Debian systems that uses the MD5 checksums to see if changes have been made to files relative to their original status as part of installed packages.

A

debsums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

COMMAND ___ is a command to list open files; it lists open files related to networking, in numeric format.

A

lsof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COMMAND ___ is the implementation of the nectar command, which can test and communicate over TCP and UDP connections.

A

nc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COMMAND ___ is a command used to verify network connections by port, routing tables by Internet Protocol (IP) address, and more.

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COMMAND ___ is a flexible command that can be used to scan Transmission control Protocol/Internet Protocol (TCP/IP) network communication by protocol and port.

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ is a Linux distribution currently based on Ubuntu with penetration testing tools, released in live CD and live USB format.

A

BackTrack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ is a protocol of the TCP/IP suite associated with automatic assignment of IP addresses; may also be used for the automatic acquisition of IP addresses from a Dynamic Host Configuration Protocol (DHCP) server on a remote network. Associated with UDP port 68.

A

(BOOTP) Bootstrap Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is a password tool designed to identify passwords that are too simple for a secure system.

A

Hydra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is a password tool designed to identify passwords that are too simple for a secure system.

A

John the Ripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is a Linux distribution most well known for its live CDs and DVDs.

A

Knoppix STD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ is a prominent white-hat hacker. The developer of the map command. Known in the open source security community by the single name ___.

A

Lyon, Gordon

“Fyodor”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ is a vulnerability scanning program with a Web-based interface, based on code that was previously released under open source licenses.

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ is a utility that can read TCP and UDDP packets, normally associated with the nc command.

A

netcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ is a Linux distribution currently based on Fedora with a variety of security testing tools, including many of those listed at http://sectools.org/ .

A

Network Security Toolkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ is a password tool designed to identify passwords that are too simple for a secure system.

A

RainbowCrack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ is an older open source network analyzer. Later versions were released under proprietary licenses as part of SAINT.

A

(SATAN) Security Administrator Tool for Analyzing Networks

17
Q

___ is a vulnerability scanning program with a Web-based interface, based on code that was previously released as SATAN under open source licenses.

A

(SAINT) System Administrators Integrated Network Tool

18
Q

___ is an intrusion detection system (IDS) with modes associated with IPTABLES firewall rules; associated rules are updated on a regular basis.

A

Snort

19
Q

___ is a family of virtual machine software that works with everything from software-based virtualization with programs like VMware Player to bare-metal virtualization with programs like vSphere.

A

VMware

20
Q
  1. Which of the following commands, when used inside and outside of a firewall, can best test the effectiveness of that firewall?
  2. iptables
  3. telnet
  4. nmap
  5. lsof
A

nmap

21
Q
  1. Which of the following is NOT a password-cracking tool?
  2. nmap
  3. John the Ripper
  4. Hydra
  5. RainbowCrack
A

nmap

22
Q
  1. What is the TELNET command that would connect to an open port 25 and active server on a system with an IP address of 10.12.14.16?
A

telnet 10.12.14.16 25

23
Q
  1. Which of the following commands includes port information for TCP and UDP communication in numeric format?
  2. .netstat -aunp
  3. .netstat -atnp
  4. .netstat -aund
  5. .netstat -atunp
A

.netstat -atunp

24
Q
  1. Which of the following commands can help you discover the active hosts on the 192.168.0.0/24?
  2. nmap -sP 192.168.0.0/24
  3. nmap -sH 192.168.0.0/24
  4. nmap -sh 192.168.0.0/24
  5. nmap -sPO 192.168.0.0/24
A

nmap -sP 192.168.0.0/24

25
Q
  1. Which of the following commands verifies installed files for all of the Debian-style packages installed on a system?
  2. rpm -Va
  3. dpjg Va
  4. debsums
  5. dpkg -qa
    .
A

debsums

26
Q
  1. You can install AIDE from supported repositories for both Red Hat Enterprise Linux and Ubuntu.
    TRUE OR FALSE
A

TRUE

27
Q
  1. Which of the following commands sets a last password change date of April, 2010, for user michael?
  2. chage -c 2010-04-01
  3. chage -d 2010-04-01
  4. chage -e 2010-04-01
  5. chage -i 2010-04-01
A

chage -d 2010-04-01

28
Q
  1. What is the full path to the PAM configuration file that regulates logins on a Linux system?
A

/etc/pam.d/login

29
Q
  1. Which of the following virtual machine options is the default open source solution for the latest Red Hat and Ubuntu distributions?
  2. KVM
  3. Xen
  4. Virtualbox, open source edition
  5. Hyper-V
A

KVM

30
Q
  1. Which of the following COMMANDS opens a graphical tool that depicts the current CPU and memory load for virtual machines on the target host system?
  2. virt -viewer
  3. virsh
  4. virt-manager
  5. virt -top
A

virt-manager

31
Q
  1. Nessus is still released under an open source license.

TRUE OR FALSE

A

FALSE

32
Q
  1. Which of the following modes does not apply to Snort as an intrusion detection system?
  2. Sniffer mode
  3. Inline mode
  4. Password mode
  5. Network mode
A

Password mode

33
Q
  1. What is the COMMAND nc that would connect to and get verbose information on an open port 25 and active server on a system with an IP address of 10.12.14.16?
A

nc -v 10.12.14.16. 25

34
Q
  1. Which of the following is NOT an option for bootable Linux systems with security testing tools?
  2. BackTrack
  3. Knoppix STD
  4. Netcat
  5. Network Security Toolkit
A

Netcat