Question Set (1) Flashcards

1
Q

What is passive reconnaissance?

A

Passive reconnaissance does not directly impact, alert or establish any type of connection between the victim and the adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which encryption was selected by NIST as the principle method of providing confidentiality after the DES algorithm?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What tool is able to conduct a Man-In-The-Middle attack on an 802.3 environment?

A

Cain & Able

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a traditional firewall and an IPS?

A

An IPS can dissect packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it important to scan your target network slowly?

A

To avoid alerting the IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the most cost effective way to prevent social engineering attacks?

A

Implement user awareness training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In which phase within the ethical hacking framework do you alter or delete log information?

A

Covering tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A hacker is conducting the following on the target workstation: nmap -sT 192.33.10.5 Which phase is the attacker in?

A

Scanning and enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which encryption algorithm is a symmetric stream cipher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the most important aspect when conducting a penetration test?

A

Receiving a formal written agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are CISO for a tech company. You need to implement an encryption cipher for your mobile devices. What encryption standard will you most likely chooose?

A

ECC: Elliptic Curve Cryptography requires less computational resources because it uses shorter keys compared to other asymmetric methods. It is often used in low-power devices for this reason.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a SYN scan accomplish?

A

It establishes only a “half open” connection. It is used to detect open ports but does not complete the 3-way handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the major vulnerability for an ARP request?

A

The address request can be spoofed with the attacker’s MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are CISO of a website. It has been compromised. What is your most likely first course of action?

A

Restrict access to sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In what phase is an attacker who is currently conducting a successful man-in-the-middle attack?

A

Maintaining access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What method of exploitation allows the adversary to test for SQL queries within the URL?

A

SQL Injection

17
Q

What is the default TTL value for Microsoft Window 7 OS?

A

128

18
Q

Which input value would you utilize in order to evaluate and test for SQL injection vulnerabilities?

A

1’ or ‘1’ = 1

19
Q

What is the downside of using SSH with telnet when it comes to security?

A

You can not see what the adversary is doing.

20
Q

What year did the Ping of Death first appear?

A

1996

21
Q

Which of the following was most infectious:

a. Melisa
b. I Love You
c. Blue Cross
d. Stuxnet

A

The Melisa virus. The Melisa virus occurred on March 26, 1999 and infected over 100,000 computers within 3 days. It exploited the fact that macros were enabled by default in the MS Office Ste. The macro executed and emailed contacts found w/in MS Outlook.

22
Q

You receive a ticket from a user that their computer is slow and sometimes documents disappear or move location. You remote into the user’s computer to investigate. Where is the most likely place to see if any new processes have started?

A

The “Processes” tab in Task Manager

23
Q

What does a checksum indicate?

A

A checksum indicates that there were changes to the data during transit or at rest.

24
Q

What key strengths does RSA use?

A

1024 and 2048 bit key strengths as asymmetric encryption algorithms

25
Q

To provide non-repudiation for email, which algorithm would you choose to implement?

A

DSA (Digital Signature Algorithm) provides only non-repudiation for emails. It does not provide confidentiality, integrity or even authentication.