Ethical Hacking Review

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/45

flashcard set

Earn XP

Description and Tags

A set of flashcards based on the lecture notes covering key concepts in Ethical Hacking.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

What is the essential purpose of a port scan?

To identify open ports and services running on a target machine, helping in assessing network security by detecting vulnerabilities.

2
New cards

What is a ping sweep used for?

To determine which hosts are active on a network by sending ICMP Echo requests and analyzing the responses.

3
New cards

How does a SYN scan differ from a full connect scan?

A SYN scan only sends SYN packets to check if a port is open without completing the TCP handshake, while a full connect scan completes the TCP handshake.

4
New cards

What does Nmap mean when it shows open|filtered?

It indicates that Nmap cannot determine if a port is open or filtered due to no response to its probes.

5
New cards

What is a common downside of running a vulnerability scan?

It may cause network disruptions or crashes, as some scans can be intrusive and overwhelm network resources.

6
New cards

What does HMAC stand for?

Hashed Message Authentication Code, which uses a cryptographic hash function combined with a secret key to generate a MAC.

7
New cards

What are the main components required to generate a MAC?

A message, a secret key, and a MAC algorithm (e.g., HMAC, CBC-MAC).

8
New cards

What security properties does a MAC provide?

Integrity, ensuring the message hasn't been altered; and authentication, confirming the sender is legitimate.

9
New cards

What is a digital signature?

A cryptographic scheme for verifying the authenticity of a message using asymmetric cryptography.

10
New cards

What are the three primary security services provided by digital signatures?

Integrity, Authentication, Non-repudiation.

11
New cards

Why is a hash function used in digital signatures?

To reduce the message size and improve security against attacks.

12
New cards

What is the primary difference between MACs and digital signatures?

MACs use symmetric keys (shared between sender and receiver), while digital signatures use asymmetric keys (different keys for signing and verifying).

13
New cards

What happens if the hash function used in digital signatures is weak?

An attacker can create collisions, forging signatures.

14
New cards

What are the advantages of using ECDSA over RSA for digital signatures?

Stronger security with smaller keys and faster computations.

15
New cards

What is the purpose of a Certificate Authority (CA) in digital signature systems?

A CA issues and verifies digital certificates, ensuring the legitimacy of public keys.

16
New cards

What is the role of ARP in networking?

ARP resolves IP addresses to MAC addresses within a local network.

17
New cards

What is the function of a firewall?

To block unauthorized transmissions from coming in or going out of a network system.

18
New cards

What are the five layers in the Internet protocol stack?

Application, Transport, Network, Link, and Physical.

19
New cards

What is the purpose of Google hacking?

Using advanced search operators to find specific types of information or vulnerabilities on websites.

20
New cards

What could be a disadvantage of using hash functions for MAC generation?

Hash functions can be susceptible to collision attacks if they lack strong collision resistance.

21
New cards

What is a characteristic of a bus network in communication?

A bus network travels in a single communication line, allowing data to travel in one direction at a time.

22
New cards

What is the structure of a star network?

In a star network, all devices are connected to a central hub.

23
New cards

What device did the black hat hacker install at the unattended workstation to recover sensitive information?

A keylogger.

24
New cards

What is an advantage of using masscan over nmap?

Masscan can scan more addresses faster than nmap.

25
New cards

What is the CIDR notation for the subnet mask 255.255.252.0?

/22

26
New cards

What subnet mask corresponds to the bit pattern 11111111 11111111 10000000 00000000?

255.255.128.0

27
New cards

What type of port scan has the FIN, PSH, and URG flags set?

XMAS scan

28
New cards

Which tool can an attacker use to find servers, webcams, printers, routers, and other devices connected to the Internet?

Shodan

29
New cards

Which commands can be used to view the contents of a file?

Cat command, More command, and Disp command

30
New cards

Which tool should John, a security analyst, use to monitor network activity and identify packets containing malicious content?

Snort

31
New cards

What is the Protocol Data Unit (PDU) used in TCP communications?

A segment

32
New cards

What does the command $* represent in shell scripting?

$* shows all parameter values passed to the shell script.

33
New cards

If Joseph, a security analyst, sees that the SYN flag is set on a packet, which protocol is in use?

TCP

34
New cards

Which layer manages communication between endpoints for maintaining application communication (client or server)?

Network layer

35
New cards

What tool provides free information about a website, including the phone number, administrator's email, and the domain registration authority?

whois

36
New cards

Which RIR would you consult for additional IP address allocation in North America?

ARIN

37
New cards

What should Jordan use to remediate vulnerabilities after a breach of customer personal information?

Data leak prevention

38
New cards

Which tool helps in identifying unusual behavior to secure resources after a data breach?

Behavioral analytics

39
New cards

What tool can Jordan use to analyze the traffic on the network for security vulnerabilities?

Protocol analyzer

40
New cards

If you needed to generate alerts based on anomalous traffic in your network, what security device would you be most likely to use? 

IDS

41
New cards

A hacker is conducting the following on the target workstation: 

nmap -sT 192.33.10.5

The attacker is in which phase?

Scanning and enumeration

42
New cards

Which one of the following types of information is NOT available via Whois?

Passwords

43
New cards

In the methodology used to secure an organization, which step includes the process of ethical hacking?

Assessment

44
New cards

Which protocol is necessary to enable the functionality of traceroute?

ICMP

45
New cards

The packet indicates the physical destination address as ff.ff.ff.ff.ff.ff. What type of MAC address is this?

Broadcast

46
New cards

What is the purpose of a security policy?

To provide high-level guidance on the role of security