Questions Flashcards
Which element of security ensures a data message arrives at its destination with no alteration?
Integrity ensures data stays in the form it was orginally intended, durring transit and at rest.
A hacker grows frustrated in his attemps against a network server and performs a successful denial of service attack. Which security element is being compromised?
Availability- Ensures communication systems and data are ready for use when legitimate users need them.
As security in the enterprise increases:
Security triad- As security increases, functionality and ease of use decrease.
An ethical hacker is hired to test the security of a business network. The CEH is given no prior knowledge of the network and has a specific framework in which to work, defining boundaries, Non-disclosure agreements, and the completion date. Which of the following is a true statement?
Who is attempting what type of test?
An ethical hacker was hired under a specific agreement, making him a white hat.
The test he was hired to preform is a no knowledge attack, making it a black box test.
When an attack by a hacker is politically motivated, the hacker is said to be participating in:
Hackers who use their skills and talents to forward a cause or a political agenda are practicing hactivism.
Two hackers attempt to crack a company’s network resource security. One is considered an ethical hacker, whereas the other is not. What distinguishes the ethical hacker from the cracker?
The ethical hacker always obtains written permission before testing, and never performs a test without it.
In which stage of an ethical hack would the attacker actively apply tools and techniques to gather more in-depth information on the targets?
The second of the five phases of an ethical hack attempt, scanning and enumeration.
What type of attack is generally conducted as an inside attacker with elevated privileges on the resources?
A White box attack is intended to simulate an internal attacker with elevated privileges, such as a network administrator.
Which attacks take advantage of the built in code and scripts most off the shelf applications come with?
Most software inevitably comes with built in code and script vulnerabilities, and attacks taking advantage of this are known as shrink wrap attacks.
A number of laws are relevant to ethical hacking. Within the United States, which federal statute specifically addresses hacking under US Law?
United states Code, Title 18 defines most of the US law concerning hacking and computer crime.
Which act attempts to ensure a standard level of security in US federal systems?
The federal Information Security Management Act provides a green light to an ethical hacker with regard to a lot of information, because it makes this information readily available to the public.
As part of a pen test, an ethical hacker discovers a file listing government workers social security numbers. His dissmination of this document is best governed by which act?
The Privacy Act protects information of a personal nature, including social security numbers.
Cade ran a scan on a system and could not identify the operating system. There does seem to be a webserver running. How can that fact help Cade figure out the rest of the system?
Banner grabbing is a basic activity on a pentest. Each protocol requires different commands; therefore, this is also a good way to verify services on the open ports.
You are conducting a test and get caught. What document will ensure that you are protected from negative consequences within the target company?
Make sure the person who issues your get out of jail free card actually has the authority to do so. The penetration test should be sponsored by senior management, who should also issue the other legal documents as well.
Sara has been asked to perform a port scan on a number of servers to check for access points that should not be running but would have elevated privileges. She is not familiar with port numbers and isn’t sure how to scan only those that we know meet the scanning criteria. What advice would you give her?
She should scan 0-1023. The key words are ‘elevated privileges’ and ‘known ports’