Review 8 Flashcards

1
Q

What term describes the method of embedding data into legitimate files like graphics, banner ads, or plain text messages to hide it and then extracting the data once it reaches its destination?

Question options:

Obfuscation

Steganography

Cryptography

Alternate data streams

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which rootkit detection method works by running a tool to scan a clean system to create a database, and then compares the current scan to the clean database?

Question options:

Signature-based detection

Integrity-based detection

Heuristic or behavior-based detection

Cross view-based detection

A

Integrity-based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following tools clears the temporary files, history, and cookies from each of the six major search engines?

Question options:

Tracker

Clear My History

Ccleaner

Dump Event Log

A

Ccleaner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to the text, what is one of the easiest ways that a hacker gains access to a system?

Question options:

Passwords

Poor physical security

Social engineering

Unsecured networks

A

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which technical password attack can be done through either hardware devices or software programs on an individual computer or on a whole network?

Question options:

Brute Force

Sniffing

Pass the hash

Keylogger

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which protocol allows authentication over a non-secure network by using tickets or service principal names (SPNs)?

Question options:

Kerberos

LDAP

cPassword

LSASS

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following allows you to hide a Linux, UNIX, or OS X file?

Question options:

Incorporating the file in the Alternate Data Streams (ADS)

Choosing the hidden option in the file attributes menu

Placing a period at the beginning of the file name

Placing a period at the end of the file name

A

Placing a period at the beginning of the file name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a database that stores user passwords in Windows as an LM hash or an NTLM hash?

Question options:

LSASS

Kerberos

LDAP

SAM

A

SAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following tools allows you to modify the timestamp of a file?

Question options:

timestamp

alter

modtime

touch

A

touch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

According to the instructor’s presentation, ideally how often should you change your password?

Question options:

30 days

90 days

45 days

60 days

A

30 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of technique to maintain access to a system often utilizes rootkits, Trojan horses, and Remote Access Trojans (RATs)?

Question options:

Writeable Services

Crackers

Spyware

Backdoors

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____________ occurs when an attacker accesses the network as a non-administrator level user and gains access to administrative-level privileges.

Question options:

LDAP escalation

Privilege escalation

Admin escalation

Privilege hijacking

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What term describes a strategy used to make cracking passwords more difficult by adding random bits of data to a password before it is stored as a hash?

Question options:

Password Hashing

Bit Manipulation

Password Salting

Password Encryption

A

Password Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following privilege escalation tools allows users access to the command prompt to perform basic system maintenance tasks during the boot process?

Question options:

Trinity Rescue Kit

Ultimate Boot CD

ERD Commander

OPH Crack

A

ERD Commander

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which technical password attack often runs in the background, making it undetectable to the victim?

Question options:

Brute Force

Sniffing

Pass the hash

Rainbow

A

Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly