Questions Flashcards

1
Q

How can you tell a UDP port is closed on a target IP?

A

Returns ICMP_PORT_UNREACHABLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a socket?

A

The combination of the IP address of the station and a port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a packet (RFC 1594 definition)

A

Self contained independent entity of data
Carries sufficient information to be routed from the source to the destination computer without reliance on earlier exchanges between source/destination computer and the transporting network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a hash function

A

One way mathematical function

Can’t calculate input from the result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does !X mean in trace route output?

A

Communication administratively prohibited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a zone?

A

A point of delegation in the DNS tree. Contains all the names from a certain point downward except those which are delegated to other zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can you tell a TCP port is open on a target IP?

A

The target returns SYN/ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ports 135 139 and 445 are open. What’s the best guess at the OS

A

Windows 2000 or later (port 445 is 2k+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do some firewalls try to limit by enforcing rules on how long get and post requests can be

A

Buffer overflow attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens if you digitally sign and inject a footer on an email message in the wrong order

A

The footer will invalidate the signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Does the sasser worm only attack hosts running the MSSQL server

A

No

MS04-011
Starts an FTP server
Generates a list of IP addresses to target based on the hosts IP addresses
Modifies the registry so it runs on system startup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What malware exploits XSS vulnerability and was developed to propagate over MySpace?

A

Samy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What RPC program number represents ttdbserverd

A

100083

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What weak reversible cipher can be used by Cisco routers to encrypt passwords?

A

Type 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is RIPv1 authentication method

A

Does not support authentication of messages

Routing information protocol

Allowed via insecure plaintext password or an MD5 hash for version 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key size for DES

A

56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IPSec 4 main attribute classes

A

Encryption algorithm
Hash algorithm
Authentication method
Diffie-Hellman group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is click jacking

A

An attacker tricks a user into performing actions on a website by hiding clickable elements in an invisible iframe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What command displays the group membership for the current user, type of account, SID and attributes?

A

Whoami /groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Http status code 407

A

Proxy authentication required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

WEP uses a integrity check value (ICV) what attack would an attack be trying to achieve submitting a packet without an ICV

A

It will allow the attacker to derive the key stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SSH server version 1.99 supports which versions of SSH

A

Versions 1 and 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is 0x0100 in an sql server password?

A

Padding, the salt value is placed after this padding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RPORT 10,2,0,2,10,10

A

10.2.0.2 is the IP address of the client

10,10 must be converted to hex then to binary then to decimal to get the TCP port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RealVNC 4.1.1 is vulnerable to what attack

A

Type 1 authentication can be specified to disable authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How many secret bits in a 128 bit WEP key

A

104

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

TCP ports 135 and 139 open on a server. What’s the best guess at the OS

A

Windows NT 4 or later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

ArcServe 5.11 is vulnerable to which attack

A

Stack based buffer overflow causing custom code to run in the processes current context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What ports must be open on a firewall to allow IKE VPN to function

A

UDP 500, protocol 50 & 51

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What responds to an nap fin scan -sF with FIN/ACK

A

Solaris
AIX
HPUX
Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

SNMP MIB 55 and 53 meaning

A

53 copies from router to the server (to the device)

55 from the server to the router (from the device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Correct sequence to send SMTP mail

A
Help
Mail from
Rcpt to
Subject
Data
33
Q

Where does record route (ping -r) store the list of hops

A

In the IP header

34
Q

What device has a TTL of 255

A

Cisco

35
Q

TTL of 64

A

Linux kernel 2.4 and 2.6
Googles customised Linux
Free BSD

36
Q

TTL of 128

A

Windows XP

Windows 7, vista and server 08

37
Q

TCP window size 65535

A

Free BSD

Windows XP

38
Q

TCP window size 5840

A

Linux kernel 2.4 and 2.6

39
Q

TCP window size 5720

A

Googles customised Linux

40
Q

TCP window size 8192

A

Windows 7, vista and server 08

41
Q

TCP window size 4128

A

Cisco

42
Q

Mtu max transmission unit for a PPoE point to point over Ethernet network device

A

1492

43
Q

What is used for authentication in a Microsoft active directory domain

A

RADIUS

44
Q

What is the purpose of LDAP

A

A central point for user management

45
Q

What is a method of managing the flow of network traffic by allowing or denying traffic based on ports protocols and addresses

A

Firewall rules

46
Q

What is the best choice to prevent intrusions on a individual computer

A

Host based firewall

47
Q

An organisation has a web security gateway installed. What function is this performing

A

Content filtering

48
Q

What can you do to ensure the WPA signal doesn’t reach outside the building it is installed in

A

Decrease the power level

49
Q

What protocol did WEP implement incorrectly allowing it to be cracked

A

RC4

50
Q

What authentication method can provide centralised authentication for a wireless network

A

RADIUS

51
Q

What can you use to prevent company employees connecting their personal devices to the wireless network

A

MAC filtering

52
Q

If you want to segment wireless users from each other on a hotspot what should you use

A

Isolation mode

53
Q

What type of attack starts on a virtual system but can affect the physical host

A

VM escape

54
Q

What is the difference between a worm and a virus

A

A worm is self replicating a virus is not

55
Q

What type of malware is installed with USB drives

A

Trojans

56
Q

A process running on a system has system level access to the OS kernel. It has modified system files. What best describes this behaviour

A

Root kit

57
Q

Where would a security specialist look for a hooked process

A

RAM

58
Q

What will protect against a SYN attack

A

Flood guard

59
Q

An IDS detected a NOP sled. What does this indicate

A

Buffer overflow
A NOP sled makes the target address bigger so the code can jump anywhere in the sled not only at the beginning of the injected code. (No-OPeration)

60
Q

What provides fault tolerance through disk mirroring

A

RAID 1

Or disk mirroring is the technique of writing the same data to more than one disk drive

61
Q

What can remove a server as a single point of failure

A

Clustering
Allows computers to work together as a computer cluster to provide failover and increased availability of applications (also parallel calculating power)

62
Q

Which encryption algorithm uses prime numbers to generate keys

A

RSA algorithm

63
Q

What is CRL

A

Certificate revocation list

List of certificates that have been revoked/ compromised and should therefore no longer be trusted

64
Q

How many bits in an IPv6 address

A

128

65
Q

IPv6 loop back address

A

Ff00:0000:0000:0000:0000

66
Q

Which algorithm is used to store cached windows domain credentials

A

MS-CACHE

67
Q

What is the purpose of port 111

A

Portmapper

To allow the lookup of RPC services that bind to dynamic ports

68
Q

What key size is recommended as minimum for a new ssl certificate

A

2048 bits

69
Q

If nap shows a port as open/filtered what does this mean

A

UDP port

Has been filtered or is listening but not responding

70
Q

Which part of an IP header contains the source and destination IP addresses

A

The next 8 bytes/ two rows of the header

After the first 12 bytes/ top 3 rows of the header

71
Q

What does an ICMP smurf/packet magnification attack result in

A

A dos condition due to an attacker sending forged ICMP packets to vulnerable networks multicast addresses resulting in all systems on those networks sending ICMP Echo replies to the broadcast address

72
Q

Ping of death is what

A

ICMP Echo request larger than the maximum IP packet size is sent. This results in a fragmented message that the target system is unable to reassemble causing the OS to crash

73
Q

Http code 307

A

Address changed temporarily

74
Q

What vulnerability allows an attack to take control of an IIS we server from the Internet through a firewall

A

Microsoft server message block vulnerability

75
Q

Http code 413

A

Request entity too large

76
Q

What layer of the osi model is IPv4 considered to be at

A

Layer 3 network

77
Q

What osi later are TCP and udp considered to be at

A

Layer 4, transport

78
Q

What is an any cast address

A

A group of addresses where packets are delivered to only one member within the any cast group