Security Flashcards

1
Q

What is the main improvement of ipchains over ipfwadm?

A

Ability to filter packet fragments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of conducting security assessments on network resources?

A

It validates their correct application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which command enables the Windows firewall?

A

netsh firewall set opmode enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the command telnet 192.168.5.5 23, what does the number 23 stand for?

A

Port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which program replaced ipfwadm in Linux 2.2x?

A

ipchains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which program controls the packet filtering or firewall capabilities in Linux kernel versions 1.2.x and 2.0.x?

A

ipfwadm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In which CEH system hacking stage do you execute the payload?

A

Executing applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the process of deriving a value that can be used to determine if any changes have been made in a message called?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is it called when an attacker attempts to steal passwords through an innocent looking application?

A

Trojan horse attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which encryption algorithm is susceptible to a factorization attack?

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the term for a system failing to prevent traffic or actions that should be not allowed?

A

False negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three factors of authentication?

A

Something you know, something you have, and something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is it called when an unauthorized person enters the facility by following an authorized person who has successfully authenticated to the physical access system?

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of attack uses nontechnical means to obtain information useful in a network attack?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Windows security context is a hacker operating from if the hacker can spawn a shell after a successful buffer overflow attack?

A

LOCAL_SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In which CEH system hacking stage do you use Brutus?

A

Cracking passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which port number is used for SSH?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What two values must a hacker guess or estimate to highjack a TCP session?

A

The next sequence number and acknowledgment number in an exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which type of password attack attempts every combination of characters?

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of the Nessus tool?

A

Vulnerability scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of attack overwhelms a target with requests that utilize all resources on the target?

A

Denial of service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What type of authentication is being performed when a USB token and retina scan are both required?

A

Two-factor or multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which Windows command line tool can be used to assign, display, or modify ACLs (access control lists) to files or folders?

A

calcs.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In which CEH hacking stage do you use steganography?

A

Hiding files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In what type of attack does the attacker use believable language to attempt to gain confidential information, especially login credentials, from personnel?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What threat type is a spouse, friend, or even client of an employee who uses the employee’s credentials to gain access?

A

Insider affiliate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What threat type is someone with limited authorized access?

A

Insider affiliate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In what type of attack does an attacker set up a wireless access point that is configured to look exactly like a company’s valid wireless access point by using the same SSID?

A

Evil Twin

29
Q

In what attack does the attacker assume the IP address of a trusted device in an attempt to access protected resources?

A

IP spoofing

30
Q

Which program replaced ipchains in Linux 2.4x?

A

iptables

31
Q

Which port numbers are used for SMB?

A

137 to 139

32
Q

In which CEH hacking stage do try to break the security of the system?

A

Penetration testing

33
Q

Which port number is used for DNS?

A

53

34
Q

What threat type is a non-trusted individual who uses open access to gain access to an organization’s resources?

A

Outside affiliate

35
Q

What is the most valuable information you can gain from a banner grab?

A

Operating system and version

36
Q

What type of software is Zonealarm?

A

Personal firewall software

37
Q

What type of authentication is being performed when both a username and a password are required?

A

Single-factor authentication

38
Q

What threat type is an employee with all the rights and access associated with being employed by the company?

A

Pure insider

39
Q

What type of cybersecurity attack is mitigated by redundancy?

A

Denial of service

40
Q

In which CEH system hacking stage do you dump the SAM file?

A

Escalate privileges

41
Q

What is the term for the implementation of backup systems to prevent loss of access to resources?

A

Redundancy or fault tolerance

42
Q

What type of attack is mitigated by an account lockout policy?

A

Brute force password attack

43
Q

Which algorithm uses a shared private key to exchange public keys?

A

Diffie-Hellman

44
Q

Which threat agent poses the biggest threat to the disclosure of sensitive data?

A

Disgruntled employees

45
Q

Which port number is used for ICMP?

A

792

46
Q

What is the term for the decomposition of a value into a product of other values that give the original value when multiplied together?

A

Factorization

47
Q

What is the term for writing wireless access information on the side of a building?

A

War chalking

48
Q

During a TCP handshake, which value is used for the acknowledgement number in a reply packet?

A

The value of the next sequence number in the packet being acknowledged or replied to

49
Q

In what type of attack does the attacker send high-level personnel an email that appears to come from an individual who might reasonably request confidential information, but the email includes a bogus link?

A

Spear phishing

50
Q

What is the purpose of recording the steps taken when implementing a new system?

A

To document what was done and to provide a record for review if problems arise

51
Q

What is the term for a system correctly preventing traffic or actions that should be not allowed?

A

True negative

52
Q

What three protections does public key cryptography provide?

A

Encryption, integrity, and non-repudiation

53
Q

Which physical security issue is mitigated by a mantrap?

A

Tailgating

54
Q

What is the term for a system correctly allowing traffic or actions that should be allowed?

A

True positive

55
Q

What is the term for a two-door system with a small room between them which allows for visual verification of each person entering a building?

A

Mantrap

56
Q

Which port numbers are used for SNMP?

A

161 and 162

57
Q

Which security policy will mitigate the copying of sensitive data to a USB drive?

A

Controlling the use of USB ports

58
Q

Which port number is commonly used for HTTP?

A
  1. but on development servers ports 81 and 8080 are also used.
59
Q

Which tool can take ownership of a file from the Windows command line?

A

XCACLS.exe

60
Q

What is it called when a program, while writing data to memory, overruns the memory boundary and overwrites adjacent memory locations?

A

Buffer overflow

61
Q

What is the term for a system incorrectly preventing traffic or actions that should be allowed?

A

False positive

62
Q

Which Windows Server 2012 command displays all rules within Windows Firewall?

A

netsh advfirewall firewall show rule name=all

63
Q

Which security control can prevent data access by a hacker interacting and modifying HTML on a web server?

A

File permissions

64
Q

In which CEH system hacking stage do you clear the security log?

A

Cover tracks

65
Q

Which is the port number used for Telnet?

A

23

66
Q

Which term is used to describe the difficulty of factoring a value generated by large key size?

A

Trapdoor

67
Q

Which port number is used for FTP?

A

21

68
Q

What wireless protocol has been compromised because of the way it implements the RC4 algorithm?

A

WEP

69
Q

What is an unauthorized access point called?

A

Rogue access point