Security tools Flashcards

1
Q

The _____ command views and configures the host’s local routing table

A

route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The _____ command uses ICMP probes to report the round trip time (RTT) for hops between the local host and a host on a remote network on Windows.

A

tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The _____ command performs route discovery from a Linux host using UDP probes rather than ICMP.

A

traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The _____ tool for Windows provides statistics for latency and packet loss along a route over a longer measuring period.

A

pathping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ___ command is a TCP/IP command-line utility for viewing and modifying the local Address Resolution Protocol ____ cache, which contains recently resolved MAC addresses of Internet Protocol (IP) hosts on the network.

A

arp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Linux-based tool _____ can run against the /dev/mem device file provided a kernel driver

A

memdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is a hex and disk editor for Windows that, when preinstalled on the host system, allows live capture of system memory.

A

WinHex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The common Linux tool ____ is a file conversion and copying tool that can copy entire disks, including hard disk images and memory dump files such as the /dev/mem device file. This makes it useful for easily and simply obtaining captures of a system’s memory.

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ is a tool for gathering open-source intelligence (OSINT) for a particular domain or company name. It works by scanning multiple public data sources and gathering emails, names, subdomains, IPs, URLs, and other relevant data.

A

theHarvester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ____ tool is a port scanner that runs its scans through third-party websites to evade detection. This allows for stealthy port scanning.

A

scanless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ is an open-source tool that has packet sniffing and injection as well as Denial of Service (DoS) testing features built right in.

A

hping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ is a commercial suite of Windows-compatible forensic investigation software and includes the capability for live memory capture and saves the data in a proprietary .eo1 file format.

A

FTK Imager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ______ is widely used for system memory analysis and can install the pmem kernel driver, allowing tools such as memdump or dd to access the /dev/mem device memory file on Linux.

A

Volatility Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ is a framework designed for penetration test reporting and evidence gathering and can integrate with other tools, such as Metasploit, to run automated tests.

A

Sn1per

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The _______, developed by the Open Web Application Security Project (OWASP), provides scanning tools and scripts for web application and mobile app security testing.

A

Zed Attack Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ is a security product designed to analyze malware as it runs in an isolated sandbox environment. It does not scan for vulnerabilities.

A

Cuckoo

17
Q

The _____ command allows the admin to check the state of ports on the local machine (Windows or Linux)

A

netstat

18
Q

_____ is a suite of tools to assist with troubleshooting issues with Windows

A

Sysinternals

19
Q

______ is a disk wiping sanitization software tool that can purge data on disk by overwriting data with 1s and 0s.

A

Active KillDisk

20
Q

_____ is a fileless open source Linux malware framework that enables customers to build and manage payloads quickly.

A

FireELF