Final Exam Practice Flashcards

0.0(0)
studied byStudied by 14 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/245

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

246 Terms

1
New cards

What type of testing procedure involves the tester(s) analyzing the company's security policy and procedures, and reporting any vulnerabilities to management?

security test

2
New cards

Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals.

True or False

True

3
New cards

If you work for a company as a security professional, you will most likely be placed on a special team that will conduct penetration tests. What is the standard name for a team made up of security professionals?

red team

4
New cards

Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?

scripts

5
New cards

What acronym represents the U.S. Department of Justice new branch that addresses computer crime?

CHIP

6
New cards

Penetration testing can create ethical, technical, and privacy concerns for a company's management team. What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?

create a contractual agreement

7
New cards

What term best describes a person who hacks computer systems for political or social reasons?

hacktivist

8
New cards

What organization disseminates research documents on computer and network security worldwide at no cost?

SANS

9
New cards

What penetration model should be used when a company's management team does not wish to disclose that penetration testing is being conducted?

black box

10
New cards

What penetration model should a company use if they only want to allow the penetration tester(s) partial or incomplete information regarding their network system?

gray box

11
New cards

What professional level security certification did the "International Information Systems Security Certification Consortium" (ISC2) develop?

Certified Information Systems Security Professional (CISSP)

12
New cards

Penetration testers and security testers need technical skills to perform their duties effectively.

True or False

True

13
New cards

What policy, provided by a typical ISP, should be read and understood before performing any port scanning outside of your private network?

Acceptable Use Policy

14
New cards

What type of assessment performed by a penetration tester attempts to identify all the weaknesses found in an application or on a system?

vulnerability

15
New cards

When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack" the company's network, they should proceed by performing what precautionary step?

consult their lawyer

16
New cards

What derogatory title do experienced hackers, who are skilled computer operators, give to inexperienced hackers?

script kiddies

17
New cards

What penetration model would likely provide a network diagram showing all the company's routers, switches, firewalls, and intrusion detection systems, or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?

white box

18
New cards

Port scanning is a noninvasive, nondestructive, and legal testing procedure that is protected by federal law.

True or False

False

19
New cards

An ethical hacker is a person who performs most of the same activities a hacker does, but with the owner or company's permission.

True or False

True

20
New cards

What common term is used by security testing professionals to describe vulnerabilities in a network?

holes

21
New cards

What specific term does the U.S. Department of Justice use to label all illegal access to computer or network systems?

Hacking

22
New cards

What federal law makes it illegal to intercept any type of communication, regardless of how it was transmitted?

Electronic Communication Privacy Act

23
New cards

What professional security certification requires applicants to demonstrate hands-on abilities to earn their certificate?

Offensive Security Certified Professional

24
New cards

What security certification did the "The International Council of Electronic Commerce Consultants" (EC-Council) develop?

Certified Ethical Hacker (CEH)

25
New cards

What name is given to people who break into computer systems with the sole purpose to steal or destroy data?

crackers

26
New cards

What type of attack is occurring when an attacker places themselves between two parties and manipulates messages being passed back and forth?

Man-in-the-Middle

27
New cards

What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?

Internet

28
New cards

What TCP flag is responsible for delivering data directly and immediately to an application?

PSH flag

29
New cards

What protocol is the most widely used and allows all computers on a network to communicate and function correctly?

TCP/IP

30
New cards

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

zombies

31
New cards

What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?

dumpster diving

32
New cards

Which type of virus is written as a list of commands that can be set automatically to run as soon as a computer user opens the file?

macro

33
New cards

What type of attack causes the victim's computer to crash or freeze when the attacker delivers an ICMP packet that is larger than the maximum allowed 65,535 bytes?

Ping of Death

34
New cards

Symmetric algorithms use two keys that are mathematically related.

True or False

False

35
New cards

Malware is malicious software, such as a virus, worm, or Trojan program, introduced into a network.

True or False

True

36
New cards

What type of virus is used to lock a user's system, or cloud accounts until the system's owner complies by paying the attacker a monetary fee?

ransomware

37
New cards

Malware programs cannot be detected by antivirus programs.

True or False

False

38
New cards

What port does the Trivial File Transfer Protocol, or TFTP service use?

69

39
New cards

What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?

Application

40
New cards

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

denial-of-service

41
New cards

What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?

Application

42
New cards

In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?

Transport

43
New cards

In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that doesn't check for a defined amount of memory space use.

True or False

True

44
New cards

Which of the following is the process of converting ciphertext back into plaintext?

decryption

45
New cards

What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

Keyloggers

46
New cards

What port does the Hypertext Transfer Protocol, or HTTP service use?

80

47
New cards

What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?

port

48
New cards

What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters?

brute force

49
New cards

What TCP flag is responsible for synchronizing the beginning of a session?

SYN flag

50
New cards

To retrieve e-mail from a mail server, you most likely access port 119.

True or False

False

51
New cards

The acronym IDS stands for which of the following?

Intrusion Detection System

52
New cards

Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which if the following?

ciphertext

53
New cards

A DDoS attack is launched against a host from a single server or workstation.

True or False

False

54
New cards

What type of malicious program cannot stand on its own and can replicate itself through an executable program?

virus

55
New cards

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

signatures

56
New cards

When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the following attacks?

buffer overflow

57
New cards

What type of general commands allow a security tester to pull information from a Web server using a web browser?

HTTP

58
New cards

Which type of program can mitigate some risks associated with malware?

antivirus

59
New cards

Whitelisting allows only approved programs to run on a computer.

True or False

True

60
New cards

A hex number is written with two characters, each representing a byte.

True or False

False

61
New cards

If a security expert decides to study the process of breaking encryption algorithms, they are performing which of the following?

cryptanalysis

62
New cards

Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?

Session hijacking

63
New cards

What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?

chosen-plaintext

64
New cards

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

worm

65
New cards

Which type of social engineering attack attempts to discover personal information through the use of email?

phishing

66
New cards

What port does the Simple Mail Transfer Protocol, or SMTP service use?

25

67
New cards

What TCP/IP protocol is fast, unreliable, and operates at the Transport layer?

UDP

68
New cards

The virus signature file is maintained by what type of software?

antivirus

69
New cards

Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

heuristics

70
New cards

In the TCP/IP stack, the Transport layer includes network services and client software.

True or False

False

71
New cards

What type of malicious computer programs present themselves as useful computer programs or applications?

Trojan programs

72
New cards

What type of attack is being performed when an attacker intercepts the initial communications between a Web server and a Web browser while forcing a vulnerable server to insecurely renegotiate the encryption being used down to a weaker cipher?

SSL/TLS downgrade attack

73
New cards

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

Network security

74
New cards

Which of the following is a scripting language for Windows and Linux that performs repetitive tasks, such as password cracking?

EXPECT

75
New cards

What application is considered the original password-cracking program and is now used by many government agencies to test for password strength?

L0phtcrack

76
New cards

What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?

127 address

77
New cards

Which type of symmetric algorithm operates on plaintext one bit at a time?

stream ciphers

78
New cards

Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?

backdoor

79
New cards

No matter what medium connects computers on network-copper wires, fiber-optic cables, or a wireless setup; the same protocols must be running on all computers if communication is going to function correctly.

True or False

True

80
New cards

When an attacker has access to a password file, they can run a password-cracking program that uses a dictionary of known words or passwords as an input file. What type of attack is this attacker performing?

dictionary

81
New cards

What tactic is being used when an attacker trailing closely behind an employee enters a restricted area without any security credentials by utilizing their proximity to another employee with security clearance?

Piggybacking

82
New cards

What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?

Transport layer

83
New cards

Symmetric algorithms support confidentiality, but not authentication and nonrepudiation.

True or False

True

84
New cards

Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?

shoulder surfing

85
New cards

Which process enables you to see all the host computers on a network and basically give you a diagram of an organization's network?

zone transfers

86
New cards

To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?

nc -h

87
New cards

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

stealth

88
New cards

Port scanning is a method of finding out which services a host computer offers.

True or False

True

89
New cards

Which HTTP error informs you the server understands the request but refuses to comply?

403 Forbidden

90
New cards

In a normal TCP session, the sender sends a packet to another computer with which of the following flags set?

SYN flag

91
New cards

Closed ports respond to a NULL scan with what type of packet?

RST

92
New cards

Which statement is where the script performs its main task?

do

93
New cards

The HTTP CONNECT method starts a remote application-layer loopback of the request message.

True or False

False

94
New cards

Which HTTP method requests that the entity is stored under the Request-URI?

PUT

95
New cards

In a NULL scan, all packet flags are turned on.

True or False

False

96
New cards

When an individual attempts to discover as much information legally possible about their competition, what information gathering technique are they performing?

competitive intelligence

97
New cards

Which utility can extract meta-data and documents on a Website to reveal the document creator's network login, e-mail address, IP address, and other important information?

FOCA

98
New cards

What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?

Hping

99
New cards

An open port allows access to specific applications and cannot be vulnerable to attack.

True or False

False

100
New cards

Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?

script