Midterm 2 Flashcards
1
Q
- Which of the following password cracking methods is the fastest?
a. Dictionary attack
b. Brute force
c. Birthday attack
d. Reverse hash matching
A
a. Dictionary attack
2
Q
- __________means sniffing through a hub, on a hub the traffic is sent to all ports. involves only monitoring of the packets sent by others without sending any additional data packets in the network traffic.
A. Active sniffing
B. Passive sniffing
C. Hardware sniffing
D. None of the above
A
B. Passive sniffing
3
Q
- Which type of malware is likely the most impactful?
A. Worm
B. Dropper
C. Ransomware
D. Virus
A
C. Ransomware
4
Q
- What is a countermeasure for SNMP enumeration?
A. Remove the SNMP agent from the device.
B. Shut down ports 135 and 139 at the firewall.
C. Shut down ports 80 and 443 at the firewall.
D. Enable SNMP read-only security on the agent device.
A
A. Remove the SNMP agent from the device.
5
Q
- Which of the following is a tool to crack passwords?
a. Intercepting an SSH connection
b. Nessus
c. NMAP
D. John the Ripper
A
D. John the Ripper
6
Q
- Which of the following is used for recording key strokes at a terminal or keyboard using malicious software?
A.Spyware
B.Malware
C.Key logger
D.Recordware
A
C.Key logger
7
Q
- A user reports that they have downloaded a music file from the Internet. They inform you that when they opened the file, it seemed as though it installed an application, and then the user was prompted to send a payment of $500 to a Paypal accountto get the key to decrypt their hard drive.
The user no longer has access to their desktop. What could be the issue?
A. The user is experiencing a hoax.
B.The user downloaded and installed ransomware.
C. The user installed malware.
D.The user downloaded the wrong music file.
A
B.The user downloaded and installed ransomware.
8
Q
- Which tool can be used to conduct layer 4 scanning and enumeration?
a. Ping
b. Metasploit
c. John the Ripper
d. Nmap
A
d. Nmap
9
Q
- An attacker is conducting the following on the target workstation: nmap -sT 192.33.10.5. The attacker is in which phase?
a. Covering tracks
b. Enumeration
c. Scanning and enumeration
d. Gaining access
A
c. Scanning and enumeration
10
Q
- What is the most important part of conducting a penetration test? +
a. Receiving a formal written agreement
b. Documenting all actions and activities
C. Remediating serious threats immediately
d. Maintaining proper handoff with the information assurance team
A
a. Receiving a formal written agreement
11
Q
- Software that creates pop-up advertisement messages while visiting websites is known as what?
A. Adware
B. Malware
C. Pop-up blocker
D. Freeware
A
A. Adware
12
Q
- What technique would a malware author use to try to make it past an anti-malware solution?
A.Disassembly
B.Obfuscation
C.Reverse engineering
D.Dropper
A
B.Obfuscation
13
Q
- As a security administrator, you want to ensure every user only has the specific permissions and rights they need for the role they have. What principle are you following?
a. Role-based access control
b. Least privilege
c. Reducing availability
d. Setting up an encryption process
A
b. Least privilege
14
Q
- What is a common attack type of the Kerberos protocol that can look like legitimate traffic?
a. Kerberoasting
b. Javaroasting
C. Man in the Middle
d. Ticket granting compromise
A
a. Kerberoasting
15
Q
- To sniff, what mode must your network adapter be configured to in order to pull frames off an Ethernet or wireless network that aren’t addressed to you?
A.Active
B.Promiscuous
C.Stealth
D.CSMA/CD mode
A
B.Promiscuous
16
Q
- Why would an attacker conduct an open TCP connection scan using Nmap?
a. The attacker does not want to attack the system
b. The attacker made a mistake by not selecting a SYN scan function
c. The attacker is trying to connect to network services
d) The attacker is trying to make the scan look like normal traffic
A
d) The attacker is trying to make the scan look like normal traffic
17
Q
- As part of an assessment on an organization you working for, you decide to conduct a social engineering attack to gather credentials that you will use later. What type of attack would be the most efficient if you wanted to get credentials from an administrator?
A.Man-in-the-middle
B.Pharming
C.Spear phishing
D.Phishing
A
C.Spear phishing
18
Q
- What technique might a malware author use that would be most effective to evade detection by anti-malware software?
A. Encryption
B. Packing
C. Compression
D. Polymorphism
A
D. Polymorphism
19
Q
- What tool could you use to fully automate a social engineering attack, like sending out a phishing campaign?
A. Nmap
B. Metasploit
C. Setoolkit
D. Aircrack
A
C. Setoolkit
20
Q
- In which phase within ethical hacking framework do you alter or delete log information?
a. Scanning and enumeration
b. Gaining access
c. Reconnaissance
d. Covering tracks
A
d. Covering tracks