Security Flashcards

1
Q

What is the main improvement of ipchains over ipfwadm?

A

Ability to filter packet fragments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of conducting security assessments on network resources?

A

It validates their correct application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which command enables the Windows firewall?

A

netsh firewall set opmode enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the command telnet 192.168.5.5 23, what does the number 23 stand for?

A

Port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which program replaced ipfwadm in Linux 2.2x?

A

ipchains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which program controls the packet filtering or firewall capabilities in Linux kernel versions 1.2.x and 2.0.x?

A

ipfwadm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In which CEH system hacking stage do you execute the payload?

A

Executing applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the process of deriving a value that can be used to determine if any changes have been made in a message called?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is it called when an attacker attempts to steal passwords through an innocent looking application?

A

Trojan horse attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which encryption algorithm is susceptible to a factorization attack?

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the term for a system failing to prevent traffic or actions that should be not allowed?

A

False negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three factors of authentication?

A

Something you know, something you have, and something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is it called when an unauthorized person enters the facility by following an authorized person who has successfully authenticated to the physical access system?

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of attack uses nontechnical means to obtain information useful in a network attack?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Windows security context is a hacker operating from if the hacker can spawn a shell after a successful buffer overflow attack?

A

LOCAL_SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In which CEH system hacking stage do you use Brutus?

A

Cracking passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which port number is used for SSH?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What two values must a hacker guess or estimate to highjack a TCP session?

A

The next sequence number and acknowledgment number in an exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which type of password attack attempts every combination of characters?

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of the Nessus tool?

A

Vulnerability scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of attack overwhelms a target with requests that utilize all resources on the target?

A

Denial of service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What type of authentication is being performed when a USB token and retina scan are both required?

A

Two-factor or multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which Windows command line tool can be used to assign, display, or modify ACLs (access control lists) to files or folders?

A

calcs.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In which CEH hacking stage do you use steganography?

A

Hiding files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In what type of attack does the attacker use believable language to attempt to gain confidential information, especially login credentials, from personnel?
Social engineering
26
What threat type is a spouse, friend, or even client of an employee who uses the employee's credentials to gain access?
Insider affiliate
27
What threat type is someone with limited authorized access?
Insider affiliate
28
In what type of attack does an attacker set up a wireless access point that is configured to look exactly like a company's valid wireless access point by using the same SSID?
Evil Twin
29
In what attack does the attacker assume the IP address of a trusted device in an attempt to access protected resources?
IP spoofing
30
Which program replaced ipchains in Linux 2.4x?
iptables
31
Which port numbers are used for SMB?
137 to 139
32
In which CEH hacking stage do try to break the security of the system?
Penetration testing
33
Which port number is used for DNS?
53
34
What threat type is a non-trusted individual who uses open access to gain access to an organization's resources?
Outside affiliate
35
What is the most valuable information you can gain from a banner grab?
Operating system and version
36
What type of software is Zonealarm?
Personal firewall software
37
What type of authentication is being performed when both a username and a password are required?
Single-factor authentication
38
What threat type is an employee with all the rights and access associated with being employed by the company?
Pure insider
39
What type of cybersecurity attack is mitigated by redundancy?
Denial of service
40
In which CEH system hacking stage do you dump the SAM file?
Escalate privileges
41
What is the term for the implementation of backup systems to prevent loss of access to resources?
Redundancy or fault tolerance
42
What type of attack is mitigated by an account lockout policy?
Brute force password attack
43
Which algorithm uses a shared private key to exchange public keys?
Diffie-Hellman
44
Which threat agent poses the biggest threat to the disclosure of sensitive data?
Disgruntled employees
45
Which port number is used for ICMP?
792
46
What is the term for the decomposition of a value into a product of other values that give the original value when multiplied together?
Factorization
47
What is the term for writing wireless access information on the side of a building?
War chalking
48
During a TCP handshake, which value is used for the acknowledgement number in a reply packet?
The value of the next sequence number in the packet being acknowledged or replied to
49
In what type of attack does the attacker send high-level personnel an email that appears to come from an individual who might reasonably request confidential information, but the email includes a bogus link?
Spear phishing
50
What is the purpose of recording the steps taken when implementing a new system?
To document what was done and to provide a record for review if problems arise
51
What is the term for a system correctly preventing traffic or actions that should be not allowed?
True negative
52
What three protections does public key cryptography provide?
Encryption, integrity, and non-repudiation
53
Which physical security issue is mitigated by a mantrap?
Tailgating
54
What is the term for a system correctly allowing traffic or actions that should be allowed?
True positive
55
What is the term for a two-door system with a small room between them which allows for visual verification of each person entering a building?
Mantrap
56
Which port numbers are used for SNMP?
161 and 162
57
Which security policy will mitigate the copying of sensitive data to a USB drive?
Controlling the use of USB ports
58
Which port number is commonly used for HTTP?
80. but on development servers ports 81 and 8080 are also used.
59
Which tool can take ownership of a file from the Windows command line?
XCACLS.exe
60
What is it called when a program, while writing data to memory, overruns the memory boundary and overwrites adjacent memory locations?
Buffer overflow
61
What is the term for a system incorrectly preventing traffic or actions that should be allowed?
False positive
62
Which Windows Server 2012 command displays all rules within Windows Firewall?
netsh advfirewall firewall show rule name=all
63
Which security control can prevent data access by a hacker interacting and modifying HTML on a web server?
File permissions
64
In which CEH system hacking stage do you clear the security log?
Cover tracks
65
Which is the port number used for Telnet?
23
66
Which term is used to describe the difficulty of factoring a value generated by large key size?
Trapdoor
67
Which port number is used for FTP?
21
68
What wireless protocol has been compromised because of the way it implements the RC4 algorithm?
WEP
69
What is an unauthorized access point called?
Rogue access point