Midterm Flashcards
What penetration model should be used when a company’s management team does not wish to disclose that penetration testing is being conducted?
Black box
What security certification did the “The International Council of Electronic Commerce Consultants” (EC-Council) develop?
Certified Ethical Hacker (CEH
As a security tester, you can make a network impenetrable (True or False)
False
What type of testing procedure involves the tester(s) analyzing the company’s security policy and procedures, and reporting any vulnerabilities to management?
Security Test
Penetration testers and security testers need technical skills to perform their duties effectively. (True or False)
True
What organization disseminates research documents on computer and network security worldwide at no cost?
ISECOM
Port scanning is a noninvasive, nondestructive, and legal testing procedure that is protected by federal law. (True or False)
False
Penetration testing can create ethical, technical, and privacy concerns for a company’s management team. What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?
create a contractual agreement
If you work for a company as a security professional, you will most likely be placed on a special team that will conduct penetration tests. What is the standard name for a team made up of security professionals?
red team
What penetration model should a company use if they only want to allow the penetration tester(s) partial or incomplete information regarding their network system?
gray box
What professional level security certification requires five years of experience and is designed to focus on an applicant’s security-related managerial skills?
Certified Information Systems Security Professional
What name is given to people who break into computer systems with the sole purpose to steal or destroy data?
crackers
An ethical hacker is a person who performs most of the same activities a hacker does, but with the owner or company’s permission.
true
What type of assessment performed by a penetration tester attempts to identify all the weaknesses found in an application or on a system?
Vulnerability
What subject area is not one of the 22 domains tested during the CEH exam?
Trojan hijacking
What term best describes a person who hacks computer systems for political or social reasons?
Hacktivists
Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?
scripts
Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals.
True
What derogatory title do experienced hackers, who are skilled computer operators, give to inexperienced hackers?
script kiddies
What acronym represents the U.S. Department of Justice new branch that addresses computer crime?
CHIP
What professional level security certification did the “International Information Systems Security Certification Consortium” (ISC2) develop?
Certified Information Systems Security Professional (CISSP)
What policy, provide by a typical ISP, should be read and understood before performing any port scanning outside of your private network?
Acceptable Use Policy
What federal law makes it illegal to intercept any type of communication, regardless of how it was transmitted?
Electronic Communication Privacy Ac
What specific term does the U.S. Department of Justice use to label all illegal access to computer or network systems?
Hacking
What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology?
OPST
What port does the Trivial File Transfer Protocol, or TFTP service use?
69
What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?
Port
What port does the Domain Name System, or DNS service use?
53
What port does the Simple Mail Transfer Protocol, or SMTP service use?
25
What port does the Hypertext Transfer Protocol, or HTTP service use?
80
In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?
Transport
What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?
ICMP
What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?
443
What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?
Internet
What does the acronym TCP represent?
Transmission Control Protocol
In the TCP/IP stack, what layer is concerned with physically moving bits across the network’s medium?
Network
What TCP/IP protocol is fast, unreliable, and operates at the Transport layer?
UDP
In the TCP/IP stack, the Transport layer includes network services and client software. (True or False)
False
What IPv4 address class has the IP address 221.1.2.3?
Class C
What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?
Application
What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?
127 address
What type of network attack relies on guessing a TCP header’s initial sequence number, or ISN?
Session Hijacking
What TCP flag is responsible for synchronizing the beginning of a session?
SYN Flag
What 32-bit number tracks packets received by a node and allows the reassembling of large packets that have been broken up into smaller packets?
ISN
An octal digit can be represented with only three bits because the largest digit in octal is seven. (True or False)
True
A hex number is written with two characters, each representing a byte. (True or False)
False
No matter what medium connects computers on network-copper wires, fiber-optic cables, or a wireless setup; the same protocol must be running on all computers if communication is going to function correctly. (True or False)
True
What connection-oriented protocol is utilized by the Transport layer?
TCP
To retrieve e-mail from a mail server, you most likely access port 119. (True or False)
False
What TCP flag is responsible for delivering data directly and immediately to an application?
PSH Flag
A DDoS attack is launched against a host from a single server or workstation.
(True or False)
False
In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that doesn’t check for a defined amount of memory space use.
True
What type of attack causes the victim’s computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?
Ping of Death
Malware is malicious software, such as a virus, worm, or Trojan program, introduced into a network. (True or False)
True
The acronym IDS stands for which of the following?
Intrusion Detection System
Which of the following is created after an attack and usually hides within the OS tools, so it is almost impossible to detect?
rootkit
Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?
backdoor
If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?
Spyware
Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?
Signatures
Which type of virus is written as a list of commands that can be set automatically to run as soon as a computer user opens the file?
Macro
Whitelisting allows only approved programs to run on a computer. (True or False)
True