Midterm Flashcards

1
Q

What penetration model should be used when a company’s management team does not wish to disclose that penetration testing is being conducted?

A

Black box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What security certification did the “The International Council of Electronic Commerce Consultants” (EC-Council) develop?

A

Certified Ethical Hacker (CEH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

As a security tester, you can make a network impenetrable (True or False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of testing procedure involves the tester(s) analyzing the company’s security policy and procedures, and reporting any vulnerabilities to management?

A

Security Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Penetration testers and security testers need technical skills to perform their duties effectively. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What organization disseminates research documents on computer and network security worldwide at no cost?

A

ISECOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Port scanning is a noninvasive, nondestructive, and legal testing procedure that is protected by federal law. (True or False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Penetration testing can create ethical, technical, and privacy concerns for a company’s management team. What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?

A

create a contractual agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If you work for a company as a security professional, you will most likely be placed on a special team that will conduct penetration tests. What is the standard name for a team made up of security professionals?

A

red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What penetration model should a company use if they only want to allow the penetration tester(s) partial or incomplete information regarding their network system?

A

gray box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What professional level security certification requires five years of experience and is designed to focus on an applicant’s security-related managerial skills?

A

Certified Information Systems Security Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What name is given to people who break into computer systems with the sole purpose to steal or destroy data?

A

crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An ethical hacker is a person who performs most of the same activities a hacker does, but with the owner or company’s permission.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of assessment performed by a penetration tester attempts to identify all the weaknesses found in an application or on a system?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What subject area is not one of the 22 domains tested during the CEH exam?

A

Trojan hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What term best describes a person who hacks computer systems for political or social reasons?

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?

A

scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What derogatory title do experienced hackers, who are skilled computer operators, give to inexperienced hackers?

A

script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What acronym represents the U.S. Department of Justice new branch that addresses computer crime?

A

CHIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What professional level security certification did the “International Information Systems Security Certification Consortium” (ISC2) develop?

A

Certified Information Systems Security Professional (CISSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What policy, provide by a typical ISP, should be read and understood before performing any port scanning outside of your private network?

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What federal law makes it illegal to intercept any type of communication, regardless of how it was transmitted?

A

Electronic Communication Privacy Ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What specific term does the U.S. Department of Justice use to label all illegal access to computer or network systems?

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology?

A

OPST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What port does the Trivial File Transfer Protocol, or TFTP service use?

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?

A

Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What port does the Domain Name System, or DNS service use?

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What port does the Simple Mail Transfer Protocol, or SMTP service use?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What port does the Hypertext Transfer Protocol, or HTTP service use?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does the acronym TCP represent?

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

In the TCP/IP stack, what layer is concerned with physically moving bits across the network’s medium?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What TCP/IP protocol is fast, unreliable, and operates at the Transport layer?

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

In the TCP/IP stack, the Transport layer includes network services and client software. (True or False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What IPv4 address class has the IP address 221.1.2.3?

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?

A

127 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What type of network attack relies on guessing a TCP header’s initial sequence number, or ISN?

A

Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What TCP flag is responsible for synchronizing the beginning of a session?

A

SYN Flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What 32-bit number tracks packets received by a node and allows the reassembling of large packets that have been broken up into smaller packets?

A

ISN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

An octal digit can be represented with only three bits because the largest digit in octal is seven. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A hex number is written with two characters, each representing a byte. (True or False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

No matter what medium connects computers on network-copper wires, fiber-optic cables, or a wireless setup; the same protocol must be running on all computers if communication is going to function correctly. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What connection-oriented protocol is utilized by the Transport layer?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

To retrieve e-mail from a mail server, you most likely access port 119. (True or False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What TCP flag is responsible for delivering data directly and immediately to an application?

A

PSH Flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A DDoS attack is launched against a host from a single server or workstation.
(True or False)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that doesn’t check for a defined amount of memory space use.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What type of attack causes the victim’s computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?

A

Ping of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Malware is malicious software, such as a virus, worm, or Trojan program, introduced into a network. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The acronym IDS stands for which of the following?

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which of the following is created after an attack and usually hides within the OS tools, so it is almost impossible to detect?

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

A

Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which type of virus is written as a list of commands that can be set automatically to run as soon as a computer user opens the file?

A

Macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Whitelisting allows only approved programs to run on a computer. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

The virus signature file is maintained by what type of software?

A

Antivirus

63
Q

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

A

eavesdropping

64
Q

Which of the following physical security methods provides the ability to secure a company’s assets and document any individuals physical time of entry?

A

card access

65
Q

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

A

Network security

66
Q

A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?

A

social engineering

67
Q

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

A

Denial of Service

68
Q

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

A

Worm

69
Q

Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

A

heuristics

70
Q

Malware programs cannot be detected by antivirus programs. (True or False)

A

False

71
Q

What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

A

Keyloggers

72
Q

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

A

Zombies

73
Q

Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?

A

Session Hijacking

74
Q

When a programmer exploits written code that doesn’t check for a defined amount of memory space they are executing which of the following attacks?

A

Buffer Overflow

75
Q

What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

A

Virus

76
Q

Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?

A

Shoulder surfing

77
Q

When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?

A

Spear phishing

78
Q

Walking is an automated way to discover pages of a Web site by following links. (True or False)

A

False

79
Q

What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?

A

Piggybacking

80
Q

Which of the following is a text file generated by a Web server and stored on a user’s browser?

A

Cookie

81
Q

What HTTP method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body?

A

HEAD

82
Q

What is the HTTP method that retrieves data by URI?

A

GET

83
Q

Which tool can be used to gather competitive intelligence from Web sites?

A

Metis

84
Q

What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?

A

dumpster diving

85
Q

Which type of social engineering attack attempts to discover personal information through the use of email?
Correct!

A

Phishing

86
Q

What utility can be used to intercept detailed information from a company’s Web site?
Correct!

A

Zed Attack Proxy

87
Q

Which HTTP method requests that the entity is stored under the Request-URI?

A

PUT

88
Q

What 1-pixel x 1-pixel image file is referenced in an tag, and usually works with a cookie to collect information
about the person visiting the Website?

A

Web bug

89
Q

Which process utilizes the knowledge of human nature to get information from people to use for executing an attack on a computer network?

A

Social engineering

90
Q

The HTTP CONNECT method starts a remote application-layer loopback of the request message. (True or False)

A

False

91
Q

Which HTTP method is used with a proxy that can dynamically switch to a tunnel connection, such as Secure Socket Layer (SSL)?

A

CONNECT

92
Q

Which process enables you to see all the host computers on a network and basically give you a diagram of an organization’s network?

A

Zone transfers

93
Q

What area of a network is a major area of potential vulnerability because of the use of URLs?

A

DNS

94
Q

What type of general commands allow a security tester to pull information from a Web server using a web browser?

A

HTTP

95
Q

What tool can be used to read and write data to ports over a network?

A

Netcat

96
Q

Which utility can extract meta-data and documents on a Website to reveal the document creator’s network login, e-mail
address, IP address, and other important information?

A

FOCA

97
Q

When an individual attempts to discover as much information legally possible about their competition, what information gathering technique are they performing?

A

competitive intelligence

98
Q

Wget is a *nix system command that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet. (True or False)

A

True

99
Q

Network attacks can often begin by gathering information from a company’s Web site. (True or False)

A

True

100
Q

To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?

A

nc -h

101
Q

Namedroppers is a tool that can be used to capture Web server information and vulnerabilities in a Web site’s pages that could allow exploits such as SQL injection and buffer overflows. (True or False)

A

False

102
Q

If you work for a company as a security professional, you will most likely be placed on a special team that will conduct penetration tests. What is the standard name for a team made up of security professionals?

A

Red team

103
Q

What subject area is not one of the 22 domains tested during the CEH exam?

A

Trojan Hijacking

104
Q

What type of testing procedure involves the tester(s) analyzing the company’s security policy and procedures, and reporting any vulnerabilities to management?

A

Security test

105
Q

What type of attack is occurring when an attacker places themselves between two parties and manipulates messages being passed back and forth?

A

Man in the middle

106
Q

Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?

A

Scripts

107
Q

As a security tester, you can make a network impenetrable. (True or False)

A

False

108
Q

What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?

A

Transport Layer

109
Q

What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?

A

ICMP

110
Q

In the TCP/IP stack, what layer is concerned with physically moving bits across the network’s medium?

A

Network

111
Q

The virus signature file is maintained by what type of software?

A

Antivirus

112
Q

A DDoS attack is launched against a host from a single server or workstation. (True or False)

A

False

113
Q

Which HTTP method requests that the entity is stored under the Request-URI?

A

PUT

114
Q

What policy, provide by a typical ISP, should be read and understood before performing any port scanning outside of your private network?

A

Acceptable Use Policy

115
Q

What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology?

A

OPST

116
Q

What type of assessment performed by a penetration tester attempts to identify all the weaknesses found in an application or on a system?

A

Vulnerability

117
Q

In the TCP/IP stack, the Transport layer includes network services and client software. (True or False)

A

False

118
Q

What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?

A

Application

119
Q

In the TCP/IP stack, what layer is concerned with physically moving bits across the network’s medium?

A

Network

120
Q

Walking is an automated way to discover pages of a Web site by following links. (True or False)

A

False

121
Q

What HTTP method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body?

A

HEAD

122
Q

What penetration model should be used when a company’s management team does not wish to disclose that penetration testing is being conducted?

A

Black Box

123
Q

An ethical hacker is a person who performs most of the same activities a hacker does, but with the owner or company’s permission.

True or False

A

True

124
Q

What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?

A

Application

125
Q

What is the HTTP method that retrieves data by URI?

A

GET

126
Q

Which HTTP method starts a remote Application-layer loopback of the request message?

A

TRACE

127
Q

When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?

A

Spear phishing

128
Q

What professional level security certification did the “International Information Systems Security Certification Consortium” (ISC2) develop?

A

Certified Information Systems Security Professional (CISSP)

129
Q

What type of virus is used to lock a user’s system, or cloud accounts until the system’s owner complies by paying the attacker a monetary fee?

A

Ransomware

130
Q

What type of virus is used to lock a user’s system, or cloud accounts until the system’s owner complies by paying the attacker a monetary fee?

A

ransomware

131
Q

What type of general commands allow a security tester to pull information from a Web server using a web browser?

A

HTTP

132
Q

What penetration model would likely provide a network diagram showing all the company’s routers, switches, firewalls, and intrusion detection systems, or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?

A

White

133
Q

Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals.

A

True

134
Q

In the TCP/IP stack, what layer is concerned with physically moving bits across the network’s medium?

A

Network

135
Q

What port does the Hypertext Transfer Protocol, or HTTP service use?

A

80

136
Q

What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?
Correct Answer

A

Application

137
Q

What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?

A

Port

138
Q

What type of malicious computer programs present themselves as useful computer programs or applications?

A

Trojan Programs

139
Q

Which type of virus is written as a list of commands that can be set automatically to run as soon as a computer user opens the file?

A

Macro

140
Q

What tool can be used to read and write data to ports over a network?

A

Netcat

141
Q

What federal law makes it illegal to intercept any type of communication, regardless of how it was transmitted?

A

Electronic Communication Privacy Act

142
Q

What IPv4 address class has the IP address 221.1.2.3?

A

Class C

143
Q

In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?

A

Transport

144
Q

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

A

Signatures

145
Q

The HTTP CONNECT method starts a remote application-layer loopback of the request message.

A

False

146
Q

What is the HTTP method that retrieves data by URI?

A

GET

147
Q

What connection-oriented protocol is utilized by the Transport layer?

A

TCP

148
Q

In the TCP/IP stack, what layer is concerned with physically moving bits across the network’s medium?

A

Network

149
Q

Which utility is used to gather IP and domain information?

A

Whois

150
Q

What professional level security certification requires five years of experience and is designed to focus on an applicant’s security-related managerial skills?

A

Certified Information Systems Security Professional

151
Q

When a security professional is presented with a contract drawn up by a company’s legal department, which allows them to “hack” the company’s network, they should proceed by performing what precautionary step?

A

Consult their lawyer

152
Q

An octal digit can be represented with only three bits because the largest digit in octal is seven.

A

True

153
Q

What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?

A

Internet

154
Q

Which HTTP method starts a remote Application-layer loopback of the request message?

A

TRACE