Random Flashcards
Windows file servers commonly hold sensitive files, databases, passwords and more. What common vulnerability is usually used against a windows file server to expose sensitive files, databases, and passwords?
These are commonly missing patches, enabling hackers to take advantage of the vulnerabilities
Which ports are commonly found for printers?
For this type of device, the following ports are often found:
- 515
- 631
- 9100
What term describes the amount of risk an organization is willing to accept?
This is called Risk Appetite
Your organization’s networks contain 4 subnets: 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0. Using NMAP, how can you scan all 4 subnets using a single command?
nmap -P 10.0.0-3.0
What is SOA used for? What is a common vulnerability?
SOA is used by enterprises to efficiently and cost-effectively integrate heterogeneous systems.SOA is most commonly vulnerable to a XML denial of service.
What is the first character that you should use to attempt breaking a valid SQL request?
Single Quote ( ‘ ) is what you should use when doing this.
What NMAP switch would a hacker use to attempt to see which ports are open on a targeted network?
-sO is the option used within Nmap to do this.
What technique does a vulnerability scanner use in order to detect a vulnerability on a specific service?
Analyzing the response received from the service when Probed.
What command could be used to list the running services from the Windows command prompt?
“sc query” is the command that does this
When are LM hashes not generated?
These are not generated when the password length exceeds 15 characters.
What type of malicious application does not require user intervention or another application to act as a host in order for it to replicate?
A Worm does not require this
What is not a step in the NIST SP 800-115 Methodology?
Reporting
Scoping is not a step in this methodology.
What must be developed in order to show security improvements over time?
Metrics must be developed to show these over time
What type of programming language is C# and ASP.NET?
These two languages are compiled languages, not scripting languages.
What tool can be used to scan a network to perform vulnerability checks and compliance auditing?
Nessus is the tool that can scan a network to perform these actions.
What should NOT be included in your final report for the assessment and provided to the organization?
Detailed list of incurred costs should not be a part of this, but rather a part of your invoicing.
What is a formal document that states what will and will not be performed during a penetration test?
Scope of work (SOW) is the document that states this.
What programming language is most vulnerable to buffer overflow attacks? Why?
C++ is most vulnerable to these type of attacks. Many memory manipulation functions in C and C++ do not perform bounds checking and can easily overwrite the allocated bounds of the buffers they operate upon.