Section 6 Flashcards

1
Q

Which type of intrusion detection system (IDS) is used to analyze activities on the network interface of a particular asset?

A

host based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nmap

A

used for port scanning, discovering devices, and searching for hosts on a network. It is an important tool to help identify and remove unessential services when hardening an operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is used to prevent buffer overflow?

A

bounds checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of vulnerability is present when multiple threads within a process control access to a particular resource?

A

race condition
- the correct handling depends on timing or transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of attack occurs when certain print functions within a programming language are used to manipulate and view the internal memory of an application?

A

format string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of attack is an example of an input validation attack?

A

format string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When should updates be performed?

A

after testing and vetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which port service needs to be removed when running a webserver?

A

Port 53 is typically blocked on webservers to prevent Domain Name System (DNS) servers from divulging critical information to attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which action is considered a significant event that should be included in the logging process?

A

administrative privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which buffer size creates an entry point for a cyberattack when the buffer reaches 8 bytes?

A

4 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is core impact?

A

a centralized penetration testing tool that enables security teams to conduct advanced, multi-phased penetration tests. It is a type of tool categorized as an exploit framework. Exploit frameworks include pre-packaged sets of exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which symmetric encryption algorithm is the standard encryption algorithm used by the US Federal government?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of attack is a client-side attack?

A

click jacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Burp Suite

A

a web assessment and analysis tool that looks for issues on websites such as cross-site scripting or SQL injection flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of analysis tool attacks applications with inputs from a wide variety of sources in the hope that the application will fail or perform in unexpected ways?

A

Fuzzer
- a tool that bombards applications with all manner of data and inputs from a wide variety of sources, in the hope that the application will fail or perform in unexpected ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An organization is seeking to implement a solution that unifies control of all devices from a central location. Which solution should the organization implement?

A

mobile device management

17
Q

What should a company do to prevent jailbreaking on a mobile device?

A

Attaching an external management solution to a mobile device can stop jailbreaking, as it installs its own apps to provide additional security layers on the device.

18
Q

vulnerability assessment tools

A

Qualys and Nessus

19
Q

Pen. testing steps

A

○ Scoping
○ Reconnaissance
○ Discovery
○ Exploitation
○ Reporting

20
Q

A management team comes to agreement on what will be tested across the organization. Which phase of the pen testing process is the management team engaging in?

A

scoping