Security 2 Quiz 3

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

Which process enables you to see all the host computers on a network and basically give you a diagram of an organization's network?

zone transfers

2
New cards

To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?

nc -h

3
New cards

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

stealth

4
New cards

Port scanning is a method of finding out which services a host computer offers.

True or False

True

5
New cards

Which HTTP error informs you the server understands the request but refuses to comply?

403 Forbidden

6
New cards

In a normal TCP session, the sender sends a packet to another computer with which of the following flags set?

SYN flag

7
New cards

Closed ports respond to a NULL scan with what type of packet?

RST

8
New cards

Which statement is where the script performs its main task?

do

9
New cards

The HTTP CONNECT method starts a remote application-layer loopback of the request message.

True or False

False

10
New cards

Which HTTP method requests that the entity is stored under the Request-URI?

PUT

11
New cards

In a NULL scan, all packet flags are turned on.

True or False

False

12
New cards

When an individual attempts to discover as much information legally possible about their competition, what information gathering technique are they performing?

competitive intelligence

13
New cards

Which utility can extract meta-data and documents on a Website to reveal the document creator's network login, e-mail address, IP address, and other important information?

FOCA

14
New cards

What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?

Hping

15
New cards

An open port allows access to specific applications and cannot be vulnerable to attack.

True or False

False

16
New cards

Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?

script

17
New cards

What area of a network is a major area of potential vulnerability because of the use of URLs?

DNS

18
New cards

Nmap has a GUI front end that makes it easier to work with some of the complex options by providing a GUI. Which of the following is the Nmap GUI front end?

Zenmap

19
New cards

In a Linux script, which of the lines is important because it identifies the file as a script?

#!/bin/sh

20
New cards

When using a port-scanner, what procedure can be conducted to identify which IP addresses belong to active hosts?

ping sweep

21
New cards

What 1-pixel x 1-pixel image file is referenced in an html tag, and usually works with a cookie to collect information about the person visiting the Website?

Web bug

22
New cards

Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?

card access

23
New cards

Wget is a *nix system command that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet.

True or False

True

24
New cards

Attackers typically use ACK scans to get past a firewall or other filtering devices.

True or False

True

25
New cards

What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer's OS?

Connect

26
New cards

Network attacks can often begin by gathering information from a company's Web site.

True or False

True

27
New cards

What tool can be used to read and write data to ports over a network?

Netcat

28
New cards

Which of the following describes a flexible program that automates a task that takes too much time to perform manually?

customized script

29
New cards

One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?

reply

30
New cards

What type of port scan has the FIN, PSH, and URG flags set?

XMAS scan

31
New cards

Which of the following is a text file generated by a Web server and stored on a user's browser?

cookie

32
New cards

What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?

OpenVAS

33
New cards

What HTTP method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body?

HEAD

34
New cards

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?

limit their scan speeds

35
New cards

What utility can be used to intercept detailed information from a company's Web site?

Zed Attack Proxy

36
New cards

You can search for vulnerabilities in a host computer by using a port-scanning tool.

True or False

True

37
New cards

In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be operating in what state?

unfiltered

38
New cards

Walking is an automated way to discover pages of a Web site by following links.

True or False

False

39
New cards

When a TCP three-way handshake ends, both parties send what type of packet to end the connection?

FIN

40
New cards

A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?

social engineering

41
New cards

Which utility is used to gather IP and domain information?

Whois

42
New cards

What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?

NMap

43
New cards

What is the HTTP method that retrieves data by URI?

GET

44
New cards

In any *NIX system, after saving a script named "script_name," you need to make it executable so that you can run it. Which command will accomplish this task from the command line?

chmod +x script_name

45
New cards

Which of the following sometimes displays a banner that notifies the user of its presence?

Adware

46
New cards

When security professionals create a packet, they may choose to specifically set which of the following fields to help initiate a response from a target computer?

flag

47
New cards

What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?

Fping

48
New cards

Which HTTP method starts a remote Application-layer loopback of the request message?

TRACE