Review 6 Flashcards

1
Q

Which tool mainly focuses on pre-exploitation and post-exploitation pentesting tasks?

Question options:

Superscan

nmap

PsTools

Metasploit

A

Metasploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following statements is true regarding the “enumeration” phase of ethical hacking.

Question options:

Unlike the more passive phases of reconnaissance and scanning, we are moving into a more active approach to information gathering.

All of these are true regarding the enumeration phase.

The odds of getting caught are still very low.

You’re at the point where your actions are still considered to be legal.

A

Unlike the more passive phases of reconnaissance and scanning, we are moving into a more active approach to information gathering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Linux command provides information about a user?

Question options:

netuser

finger

cat

poke

A

finger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

All releases after Windows 2000 use this group to grant permissions to the creator of the file or directory.

Question options:

Creator owner

Administrators

Creator group

Users

A

Creator owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which port is used by SMB over TCP?

Question options:

53

135

445

137

A

445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which port is used by the RPC service in Windows for client/server communications?

Question options:

135

445

137

53

A

135

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Metasploit term refers to a packet containing code that helps you achieve the goal of exploiting a vulnerability?

Question options:

Payload

Exploit

Vulnerability

CVE

A

Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How many configuration passwords does SNMP have by default?

Question options:

3

2

0

1

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Windows built-in account provides almost unlimited access to the local machine?

Question options:

Admin service

Local service

System

Network service

A

System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many primary user accounts are included in a default Windows installation?

Question options:

1

2

0

3

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is NOT a DNS countermeasure?

Question options:

Disable DNS zone transfers

Utilize split DNS

Utilize digital signatures

DNS zone restrictions

A

Disable DNS zone transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What protocols does IPsec use to secure communications between VPN endpoints?

Question options:

AH, AES, ESP

AES, IKE, MD5

ESP, AH, MD5

ESP, AH, IKE

A

ESP, AH, IKE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which port is used for FTP?

Question options:

25

21

23

53

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is NOT an SNMP countermeasure?

Question options:

Monitor SNMP ports

Create SNMP agents.

Change default passwords.

Run SNSscan

A

Create SNMP agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the best way to secure LDAP?

Question options:

Block LDAP port 389.

Require password exchanges for all LDAP queries.

Block non-query LDAP ports.

Review and implement the security settings and services available with your server software.

A

Review and implement the security settings and services available with your server software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly