Section 4.1 Organizational Security Flashcards

1
Q

What command tool shows the route taken from a computer to a remote host such as a website?

A

Tracert/Traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a diagnostic tool for verifying the IP address of a hostname (a record by default) in the DNS server database?

A

Nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the equivalent of nslookup in a Linux environment?

A

dig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What commands show the IP configuration?

A

ipconfig/ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a free and open-source network mapper that can be used to create an inventory of devices on your network?

A

Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What command is good for banner grabbing?

A

Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command has the functionality of both ping and tracert? Also calculates statistics after the trace, showing the packet loss at each router (each hop) it passes through.

A

Pathping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What command is an open-source packet generator and analyzer for the TCP/IP protocol, often used for auditing firewalls and networks?

A

Hping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a native tool on Windows operating systems used to see the established connections, listening ports, and even running services?

A

Netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Linux/Unix utility for showing network connections, port scanning, and even file transfer?

A

netcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are popular free and open-source applications that will scan addresses in a range and ID open ports?

A

IP scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a protocol for mapping an IP address to a physical MAC address on a local area network?

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the “arp -a” command do?

A

shows the ARP cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What command enables listing existing routes in the local routing table, as well as adding manual entries into the network routing tables?

A

route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the “route print” command do?

A

view the local route table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the “route add” command do?

A

add a route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a command line tool used to transfer data using many supported protocols?

A

Curl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a passive tool that comes with Kali Linux used to harvest the email addresses of an organization?

A

TheHarvester

19
Q

What is a penetration test reconnaissance tool that can be used for automated tests? Can also scan for vulnerabilities, open ports, web application vulnerabilities and perform attack surface discovery.

A

Sn1per

20
Q

What is a pentesting tool used to perform anonymous open port scans on target hosts, such as web servers? (free and open source)

A

Scanless

21
Q

What is a command line tool that automatically identifies basic DNS records and it has the ability to attempt reverse DNS resolution?

A

Dnsenum

22
Q

What is a network security (vulnerability) scanner that utilizes plug-ins, which are separate files, to handle the vulnerability checks? It raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access.

A

Nessus

23
Q

What tool creates a sandbox that can be used for analyzing files for malware inspection?

A

Cuckoo

24
Q

What command in Linux can be used to create files, view files, and also concatenate several files into another file?

A

cat

25
Q

What command can we use to check the top 10 messages from a log?

A

head

26
Q

What command views the last x number of lines of a log file?

A

tail

27
Q

What command is used to search text and log files for specific values?

A

Grep

28
Q

What command is used to change the permission level?

A

chmod

29
Q

What command can add a message to the local system log file or to a remote syslog server? Frequently used to send log messages from automation scripts to record actions performed and errors encountered.

A

Logger

30
Q

What was created to serve as a secure alternative to Telnet for running commands remotely, and is commonly used when you want remote access to network devices? It can be used as a command line tool or in a Graphical User Interface (GUI), but it is not browser based.

A

SSH

31
Q

What can perform tasks in a Window’s environment? Each command is known as a cmdlet and can be saved to a script with a .ps1 extension.

A

PowerShell

32
Q

What is a popular and powerful programming language used by open source developers and data scientists? It is widely used in cybersecurity.

A

Python

33
Q

What is a suite that can be used to create and manage Transport Layer Security (TLS) and Secure Socket Layer (SSL) protocol? Often used to generate private keys, create CSR’s, install your SSL/TLS certificate, and identify certificate information.

A

OpenSSL

34
Q

What is an open-source tool that can be used to analyze .pcap files generated by either Wireshark or tcpdump? It can then replay the traffic and send it to the NIPS.

A

tcpreplay

35
Q

What is a network packet analyzer command line tool on LInux/UNIX?

A

tcpdump

36
Q

What is a free and open-source packet analyzer, with a command-line and GUI versions, available for Windows and Linux?

A

Wireshark

37
Q

When the forensics team needs to investigate an image on a desktop or laptop, what command can be used to clone a disk or copy a folder in a Linux/Unix environment?

A

dd

38
Q

What is a hexadecimal editor that can be used on any version of Windows OS’s to help forensics teams find evidence? It can be used to find and recover deleted or lost data from a corrupt drive.

A

WinHex

39
Q

When a computer system crashes, all of the content of the memory is saved in what kind of file?

A

dump (.dmp) file

40
Q

What is a data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis with a forensic tool is warranted?

A

FTK imager

41
Q

What can be used to analyze hard drives, smartphones, and media cards? Has a built-in translator to translate foreign languages into English.

A

Autopsy

42
Q

What is a collection of commonly used tools that provide a complete environment for penetration testing and exploit development? Contains capabilities to detect and then exploit vulnerabilities on remote systems.

A

Metasploit Framework

43
Q

What attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threats?

A

Common Vulnerability Scoring System (CVSS)

44
Q

What is the process of irreversibly removing or destroying data stored on a memory device? (hard dries, flash memory, SSD’s, etc.) It is important to use the proper technique to ensure that all data is purged.

A

Data Sanitization