Security Flashcards
What is the main improvement of ipchains over ipfwadm?
Ability to filter packet fragments
What is the purpose of conducting security assessments on network resources?
It validates their correct application
Which command enables the Windows firewall?
netsh firewall set opmode enable
In the command telnet 192.168.5.5 23, what does the number 23 stand for?
Port number
Which program replaced ipfwadm in Linux 2.2x?
ipchains
Which program controls the packet filtering or firewall capabilities in Linux kernel versions 1.2.x and 2.0.x?
ipfwadm
In which CEH system hacking stage do you execute the payload?
Executing applications
What is the process of deriving a value that can be used to determine if any changes have been made in a message called?
Hashing
What is it called when an attacker attempts to steal passwords through an innocent looking application?
Trojan horse attack
Which encryption algorithm is susceptible to a factorization attack?
RSA
What is the term for a system failing to prevent traffic or actions that should be not allowed?
False negative
What are the three factors of authentication?
Something you know, something you have, and something you are
What is it called when an unauthorized person enters the facility by following an authorized person who has successfully authenticated to the physical access system?
Tailgating
What type of attack uses nontechnical means to obtain information useful in a network attack?
Social engineering
Which Windows security context is a hacker operating from if the hacker can spawn a shell after a successful buffer overflow attack?
LOCAL_SYSTEM
In which CEH system hacking stage do you use Brutus?
Cracking passwords
Which port number is used for SSH?
22
What two values must a hacker guess or estimate to highjack a TCP session?
The next sequence number and acknowledgment number in an exchange
Which type of password attack attempts every combination of characters?
Brute force
What is the purpose of the Nessus tool?
Vulnerability scanning
What type of attack overwhelms a target with requests that utilize all resources on the target?
Denial of service (DoS)
What type of authentication is being performed when a USB token and retina scan are both required?
Two-factor or multi-factor authentication
Which Windows command line tool can be used to assign, display, or modify ACLs (access control lists) to files or folders?
calcs.exe
In which CEH hacking stage do you use steganography?
Hiding files
In what type of attack does the attacker use believable language to attempt to gain confidential information, especially login credentials, from personnel?
Social engineering
What threat type is a spouse, friend, or even client of an employee who uses the employee’s credentials to gain access?
Insider affiliate
What threat type is someone with limited authorized access?
Insider affiliate