Kahoot Flashcards

1
Q

In a packet, this is used to identify a set of noes that must be traversed by the packet along its path to a destination.

Padding
Routing header
flags
Type of service

A

Routing Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

No Operation instructions that slide the program execution to the next memory address are known as _______

Trespassing
Reverse Shells
Buffer Overflows
NOP sleds

A

NOP Sleds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

______ Prevents senders from denying they sent the encrypted message.

confidentiality
Authentication
Integrity
Nonrepudiation

A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Man in the Middle, machine in the middle, monkey in the middle (MITM) attack is when a/n ____________

perpetrator sets up a listener
attacker sits between two parties who think they are directly communicating
shell session is established on a connection initiated from a remote machine
adversary attempts to masquerade as a legitimate entity

A

attacker sits between two parties who think they are directly communicating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A hacker takes a device and hides malware within it hoping someone finds the device. This is best known as _____

Road Apples
Phishing
Trojan Horse
Rootkit

A

Road Apple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______ proves the contents of a message have not been changed since it was sent

Confidentiality
Nonrepudiation
Authentication
Integrity

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________ will show you the number of lines from the bottom of a file.

End
Word Count
Head
Tail

A

Tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is it when any access to information is granted to someone who shouldnt have access to it, such as redentials.

Sensitive data exposure
Broken access control
Privilege escalation
Security misconfiguration

A

Sensitive data exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This vulnerability has been around since iOS 7. Those in Bluetooth range could reprogram your iPhone.

Pegasus
iMessage
Heartbleed
AirDrop

A

AirDrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ happens when invalid data is sent to the application, intending to make it do something that it shouldn’t

Broken Authentication
SQL injection
Multi-byte NOP-sled
Buffer overflow

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARP is a protocol that enables network communications and translates IPv4 to IPv6 (T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The OG PING Utility created in 1983, was used by DARPA to test performance and was called the Packet Internet Groper (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Comparable to a classic firewall; has a choke point router filtering in bound traffic before the web server & firewall.

Retina 3.0
Retina
Network Based security
Nessus

A

Retina

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

______ may make forecasting the address to where a program jumps undo able.

Address space layout randomization
Stack randomization
Obfuscation
NOP sleds

A

Stack Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Netcat functions as a back-end tool that alows data across a client and server once the connection is established (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which rootkit infects your hard drive or system BIOS and may even be used to intercept disk-written data?

Bootloader Rootkit
Memory Rootkit
Kernel mode rootkit
Hardware or firmware rootkits

A

Hardware or Firmware rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NDP supplements several IPv4 protocols, ie ARP and ICMP redirect. However it has not improved ________.

Parameter discovery
Inverse neighbor Discovery
Prefix Discovery
Host Discovery

A

Host Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

There are four categories of IDS. What are they?

VMIDS, NIDS, HIDS, PIDS
NIDS, VMIS, TIDS, PIDS
VMIDS, NIDS, HIPS, TIPS
NIDS, WMIDS, HIDS, PINS

A

NIDS, VMIS, TIDS, PIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_____ is a device that monitors activity to identify questionable or even hostile events

Router
Switch
IDS
IPS

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NMAP, short for network mapper, can do all but which of the following?

Detect security risks
transfer files
provide a hardware and software inventory
find open ports

A

transfer files

21
Q

_______ will show you the first 3 lines of a file.

Top
Tail
Word Count
Head

A

Head

22
Q

Snort advantages include all of the following except:

It comes configured for every zero-day attack out there.
its free and you can change and build signatures
it keeps records of data packet
it can trap anomalies or unwanted data packets in traffic

A

It comes configured for every zero-day attack out there

23
Q

The integrated circuit chip (ICC) contains information about the owner, including the PIN and PKI digital certificates. (T/F)

A

True

24
Q

A worm strained up to 50 million computers in 2007. What was its name?

Slammer
Storm
ILOVEYOU
Code Red

A

Storm

25
Q

Every Snort rule must have a SID. (T/F)

A

True

26
Q

In this mode it reads packets off the network and displays them in a stream on your interface

Network intrustion detection mode
Sniffer mode
Host base intrustion prevention system
packet logger

A

Sniffer mode

27
Q

The algorithm a node uses to map an IPv6 destination address to a neighbor IPv6 address.

Next Hop determination
Address resolution
Parameter Discovery
Neighbor Discovery Protocol (NDP)

A

Next Hop determination

28
Q

Which of the following is a PING command?

  • t PINGs the specified host until stopped
  • s Strict source route along host-list
  • a denotes alphaneumeric field values
A

-t

29
Q

A shell script used to scan system binaries for rootkit alteration.

chkrootkit
zacinlo
haxorcito
backdoor

A

chkrootkit

30
Q

Logs all the packets to a disk, and can be useful for network traffic debugging

sniffer mode
network intrustion detection mode
Packet logger
host base intrustion prevention system

A

Packet logger

31
Q

Performs detection and analysis on network traffic. it is considered the most complex mode. Useful in traffic debugging.

Packet logger
Network intrustion detection mode
Host based intrustion prevention system
sniffer mode

A

Network (?)

32
Q

Pings are mostly used wen two hosts have no problem communicating with one another. (T/F)

A

False

33
Q

An attack used for almost six yearsbefore it was found to be a common rootkit attack on windows 10

Backdoor
Zacinlo
chkrootkit
Haxorcito

A

Zacinlo

34
Q

Stateless firewalls uses dynamic filtering (T/F)

A

True

35
Q

The two types of DNS queries are iterative and recursive (T/F)

A

True

36
Q

Which is not NOP-sled?

Jump sled
Multi-byte Nop Equivalent sled
Trampoline sled
one byte equivalent sled

A

Jump sled

37
Q

An attacker compromises a legitimate website knowng a victim will browse and allow them to breach their target device.

Spyware
Drive-by download
water hole
vishing

A

Driveby download (somehow)

38
Q

Much like multi byte sleds, its opcode can go straight to the shell code.

jump instructions
reverse shells
trampoline sleds
jump sleds

A

jump instructions

39
Q

PKI certificates verifies all but which of the following?

The owner of the private key
Authenticity of the relationship going forward to maintain security
Message decryption
website visitors are sending information to the intended recipient

A

message decryption

40
Q

ports _ to _ are well known port numbers, designed for internet use.

1 -1024
0-1023
0-65536
1-65535

A

0-1023

41
Q

Netcat is a ______ utility which reads and writes data across network connections using TCP or UDP protocol.

Windows
Linux
Unix
Macintosh

A

Unix

42
Q

IPv6 Vulnerabilities include all but which of the following?

Bind TCP
Dual Stacking
Multicast
Auto-Configuration

A

Bind TCP

43
Q

A common technique to get through a locked door; simply follow someone opening a door and enter before it closes.

Drive-by Download
piggy backing
stalking
tailgating

A

Piggy backing

44
Q

Encryption provides the following: confidentiality, authentication, integrity, and Nonrepudiation. (T/F)

A

True

45
Q

Retina can scan____ ie user account & mail server security holes, DoS Vulnerabilities, and even firewall issues.

an IP address or URL of a server
550 vulnerabilities
over 1200 checks on a given computer
new vulnerabilities

A

550 vulnerabilities

46
Q

____ is the amount of time it takes from release of a new patch to its full adoption among a fleet of mobile devices.

AOSP implementation
The TrustZone
The vulnerability window
the POODLE vulnerablity

A

Vulnerability window

47
Q

All of the following are the modes of snort except:

Host base Intrustion prevention system
sniffer
packet logger
Network intrustion detection mode

A

network inrustion detection mode

48
Q

Who creates digital certificates and owns the policies for verifyiing recipients and issuing the cerifiicates?

PKI certiicates
SSL cerificates
INternet assigned numbers Authority IANA
certification authorities

A

Certification Authorities