Question Set (1) Flashcards
What is passive reconnaissance?
Passive reconnaissance does not directly impact, alert or establish any type of connection between the victim and the adversary.
Which encryption was selected by NIST as the principle method of providing confidentiality after the DES algorithm?
AES
What tool is able to conduct a Man-In-The-Middle attack on an 802.3 environment?
Cain & Able
What is the difference between a traditional firewall and an IPS?
An IPS can dissect packets
Why is it important to scan your target network slowly?
To avoid alerting the IDS
What is the most cost effective way to prevent social engineering attacks?
Implement user awareness training
In which phase within the ethical hacking framework do you alter or delete log information?
Covering tracks
A hacker is conducting the following on the target workstation: nmap -sT 192.33.10.5 Which phase is the attacker in?
Scanning and enumeration
Which encryption algorithm is a symmetric stream cipher
RC4
What is the most important aspect when conducting a penetration test?
Receiving a formal written agreement
You are CISO for a tech company. You need to implement an encryption cipher for your mobile devices. What encryption standard will you most likely chooose?
ECC: Elliptic Curve Cryptography requires less computational resources because it uses shorter keys compared to other asymmetric methods. It is often used in low-power devices for this reason.
What does a SYN scan accomplish?
It establishes only a “half open” connection. It is used to detect open ports but does not complete the 3-way handshake.
What is the major vulnerability for an ARP request?
The address request can be spoofed with the attacker’s MAC address.
You are CISO of a website. It has been compromised. What is your most likely first course of action?
Restrict access to sensitive information
In what phase is an attacker who is currently conducting a successful man-in-the-middle attack?
Maintaining access