Review 6 Flashcards
Which tool mainly focuses on pre-exploitation and post-exploitation pentesting tasks?
Question options:
Superscan
nmap
PsTools
Metasploit
Metasploit
Which of the following statements is true regarding the “enumeration” phase of ethical hacking.
Question options:
Unlike the more passive phases of reconnaissance and scanning, we are moving into a more active approach to information gathering.
All of these are true regarding the enumeration phase.
The odds of getting caught are still very low.
You’re at the point where your actions are still considered to be legal.
Unlike the more passive phases of reconnaissance and scanning, we are moving into a more active approach to information gathering.
Which Linux command provides information about a user?
Question options:
netuser
finger
cat
poke
finger
All releases after Windows 2000 use this group to grant permissions to the creator of the file or directory.
Question options:
Creator owner
Administrators
Creator group
Users
Creator owner
Which port is used by SMB over TCP?
Question options:
53
135
445
137
445
Which port is used by the RPC service in Windows for client/server communications?
Question options:
135
445
137
53
135
Which Metasploit term refers to a packet containing code that helps you achieve the goal of exploiting a vulnerability?
Question options:
Payload
Exploit
Vulnerability
CVE
Payload
How many configuration passwords does SNMP have by default?
Question options:
3
2
0
1
2
Which Windows built-in account provides almost unlimited access to the local machine?
Question options:
Admin service
Local service
System
Network service
System
How many primary user accounts are included in a default Windows installation?
Question options:
1
2
0
3
2
Which of the following is NOT a DNS countermeasure?
Question options:
Disable DNS zone transfers
Utilize split DNS
Utilize digital signatures
DNS zone restrictions
Disable DNS zone transfers
What protocols does IPsec use to secure communications between VPN endpoints?
Question options:
AH, AES, ESP
AES, IKE, MD5
ESP, AH, MD5
ESP, AH, IKE
ESP, AH, IKE
Which port is used for FTP?
Question options:
25
21
23
53
21
Which of the following is NOT an SNMP countermeasure?
Question options:
Monitor SNMP ports
Create SNMP agents.
Change default passwords.
Run SNSscan
Create SNMP agents
What is the best way to secure LDAP?
Question options:
Block LDAP port 389.
Require password exchanges for all LDAP queries.
Block non-query LDAP ports.
Review and implement the security settings and services available with your server software.
Review and implement the security settings and services available with your server software.