Section 6 Flashcards
Which type of intrusion detection system (IDS) is used to analyze activities on the network interface of a particular asset?
host based
Nmap
used for port scanning, discovering devices, and searching for hosts on a network. It is an important tool to help identify and remove unessential services when hardening an operating system.
What is used to prevent buffer overflow?
bounds checking
Which type of vulnerability is present when multiple threads within a process control access to a particular resource?
race condition
- the correct handling depends on timing or transactions.
Which type of attack occurs when certain print functions within a programming language are used to manipulate and view the internal memory of an application?
format string
Which type of attack is an example of an input validation attack?
format string
When should updates be performed?
after testing and vetting
Which port service needs to be removed when running a webserver?
Port 53 is typically blocked on webservers to prevent Domain Name System (DNS) servers from divulging critical information to attackers.
Which action is considered a significant event that should be included in the logging process?
administrative privilege
Which buffer size creates an entry point for a cyberattack when the buffer reaches 8 bytes?
4 bytes
What is core impact?
a centralized penetration testing tool that enables security teams to conduct advanced, multi-phased penetration tests. It is a type of tool categorized as an exploit framework. Exploit frameworks include pre-packaged sets of exploits
Which symmetric encryption algorithm is the standard encryption algorithm used by the US Federal government?
AES
Which type of attack is a client-side attack?
click jacking
Burp Suite
a web assessment and analysis tool that looks for issues on websites such as cross-site scripting or SQL injection flaws.
Which type of analysis tool attacks applications with inputs from a wide variety of sources in the hope that the application will fail or perform in unexpected ways?
Fuzzer
- a tool that bombards applications with all manner of data and inputs from a wide variety of sources, in the hope that the application will fail or perform in unexpected ways.
An organization is seeking to implement a solution that unifies control of all devices from a central location. Which solution should the organization implement?
mobile device management
What should a company do to prevent jailbreaking on a mobile device?
Attaching an external management solution to a mobile device can stop jailbreaking, as it installs its own apps to provide additional security layers on the device.
vulnerability assessment tools
Qualys and Nessus
Pen. testing steps
○ Scoping
○ Reconnaissance
○ Discovery
○ Exploitation
○ Reporting
A management team comes to agreement on what will be tested across the organization. Which phase of the pen testing process is the management team engaging in?
scoping