Terms Lesson 1 Flashcards

1
Q

Eavesdropping

A

Escuchar secretamente

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pod slurping

A

Extraer datos del computador a través de USB usando iPods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wire tapping

A

Escucha telefónica. Pinchazo telefónico

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IA

A

Information assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ciberkill chain

A
Real - recon
Women - weaponization
Date - delivery
Engineers - explotation
In - installation
Command - C2
Armor - actions and objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacking phases

A
Recon
Scanning
Gaining access
Maintaining access
Clearing tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk management

A
Identification
Assessment (evaluación)
Treatment
Tracking
Review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat modeling

A
Identify security objectives
Application overview
Decompose the application
Identify threats
Identify vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Ports:
NTP
TFTP
BGP
Kerberos
Finger
Netbios
LDAP
Telnet
A
123
69
179
88
79
139
389
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following information is collected using enumeration?

Open ports and services

Operating systems, location of web servers, users, and passwords

Email Recipient’s system IP address and geolocation

Network resources, network shares, and machine names

A

Network resources, network shares, and machine names

Enumeration is the process of extracting user names, machine names, network resources, shares, and services from a system or network.
Enumeration allows you to collect following information:
Network resources
Network shares
Routing tables
Audit and service settings
SNMP and FQDN details
Machine names
Users and groups
Applications and banners
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the default port used by IPSEC IKE protocol?

Port 51

Port 4500

Port 50

Port 500

A

Port 500

IPSEC IKE: IP Security Internet Key Exchange Protocol is used for establishing Security Association for IPsec Protocol Suite. IKE uses UDP port 500 for establishing security association.
UDP port 4500 is used IPsec NAT-T
Remote Mail Checking Protocol uses UDP/TCP port 50
Port 51 is reserved by IANA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following NetBIOS service codes is used to obtain information related to the master browser name for the subnet?

<03>

<20>

<1D>

<1E>

A

1D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following tools is not a NetBIOS enumeration tool?

Hyena

NetScanTools Pro

OpUtils

SuperScan

A

Among the given options, Hyena, SuperScan, and NetScanTools Pro can be used to perform NetBIOS enumeration, whereas OpUtils is an SNMP enumeration tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following commands allows an SNMP agent to inform the pre-configured SNMP manager of a certain event?

GetNextRequest

Trap

GetResponse

SetRequest

A

Trap

SetRequest: Used by the SNMP manager to modify the value of a parameter within an SNMP agent’s management information base (MIB).
Trap: Used by an SNMP agent to inform the pre-configured SNMP manager of a certain event.
GetNextRequest: Used by the SNMP manager continuously to retrieve all the data stored in an array or table.
GetResponse: Used by an SNMP agent to satisfy a request made by the SNMP manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following management information bases (MIBs) contains object types for workstation and server services?

HOSTMIB.MIB

MIB_II.MIB

WINS.MIB

LNMIB2.MIB

A

LNMIB2.MIB

WINS.MIB: For the Windows Internet Name Service (WINS)
HOSTMIB.MIB: Monitors and manages host resources.
MIB_II.MIB
: Manages TCP/IP-based Internet using a simple architecture and system.
LNMIB2.MIB: Contains object types for workstation and server services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which protocol enables an attacker to enumerate user accounts and devices on a target system?

SMTP

SNMP

NetBIOS

TCP

A

SNMP

SNMP (Simple Network Management Protocol) is an application layer protocol that runs on UDP and maintains and manages routers, hubs, and switches on an IP network. SNMP agents run on Windows and UNIX networks on networking devices.
SNMP holds two passwords to access and configure the SNMP agent from the management station:
Read community string: It is public by default; allows viewing of device/system configuration
Read/write community string: It is private by default; allows remote editing of configuration
Attacker uses these default community strings to extract information about a device Attackers enumerate SNMP to extract information about network resources such as hosts, routers, devices, shares, etc. and network information such as ARP tables, routing tables, traffic, etc.