Tools/Systems/Programs Flashcards

1
Q

What are the two detection methods used by IDS systems?

A

Signature-based and anomaly-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of the web site archive.org?

A

This Web site is an Internet archiving site that maintains archives of Web sites over many years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Nmap switch performs a normal connect scan?

A

-sT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which Nmap switch performs a normal stealth scan?

A

-sS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Nmap switch performs an inverse Xmas scan?

A

-sX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Nmap switch performs a ping scan?

A

-sP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Nmap switch includes protocols in the output?

A

-sO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In which phase of an attack does information gathering, physical and social engineering, and locating network ranges occur?

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In which phase of an attack does discovery of live hosts, access points, accounts and policies, and vulnerability assessment occur?

A

Scanning/Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In which phase of an attack are the systems breeched, malicious code planted and backdoors opened?

A

Gaining Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In which phase of an attack are rootkits installed and unpatched systems taken advantage?

A

Maintaining Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In which phase of an attack is the record of the attack wiped or obscured?

A

Clearing Tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What would you use the tool ADMutate for?

A

To disguise the attack signature for the purpose of evading a signature based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the data payload called when ADMutate is in use?

A

An egg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of tool is Mole?

A

An automatic SQL Injection exploitation tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does the tool DataThief operate?

A

It extracts (reverse engineers) data points from a graph

17
Q

What is the name of a simple UNIX utility that reads and writes data across network connections using either TCP or UDP?

A

Netcat

18
Q

What is the purpose of the Cain and Abel tool?

A

Password recovery tool for Windows

19
Q

What password cracking method uses word lists in combination with numbers and special characters?

A

Hybrid attack

20
Q

What password cracking method uses an input list or file to discover the password?

A

Dictionary attack