Book Tests Flashcards
(156 cards)
the greatest danger from leaving default username and passwords on devices is from ___ attacks
automated
in order to hijack a domain, the following generally needs to occur
the registration needs to lapse
when typing a url into a browser takes you to the wrong site, but typing the IP address doesn’t, then it is a case of ___
DNS poisoning
a Pixie Dust attack requires ___ to be enabled on the wireless network
WPS
a ___ scan reveals system sprawl and undocumented devices
arp (or Discovery on IPv6)
passive attack tools are defined as tools that will not ___
engage the system, or alert the target’s systems in any way
use ___ to guard against a DNS poisoning attack
DNSSEC
If a public DNS server is being used in an amplification attack, disable ___ in the server to stop it
Open Resolution
a ___ attack forces a process to load unauthorized code from a dynamically linked library
DLL injection
an ___ is the most sophisticated threat agent
Advanced Persistent Threat (APT)
to protect against ___ attacks, disable browser extensions
man in the browser
a ___ will usually eliminate vulnerability to SQL injections
Web Application Firewall (WAF)
self-signed certificates can be OK to use for ___
internal use
ASLR is a security technique that
randomizes the location of objects in memory (Address Space Layout Randomization)
another term for deauthentication attacks is ___
disassociation attacks
in a ___ spoofing attack, a local switch is fooled into directing reply traffic back to the spoofer
MAC
passive reconnaissance for pen testing can be accomplished with [nmap; Nessus; Metasploit; Aircrack]
Aircrack -ng
public certificates that can be shared are files that have the extension ___
.CRT
while rainbow tables are good at cracking complex passwords, if the password is ___ they are much less effective
salted
after a ___ attack, the attacker can typically execute any commands they wish
buffer overflow
checking the “Enable Safe Checks” on a vulnerability scanner means the scanner ___
will only use non-intrusive plugins
___ prevent the system from executing unauthorized code
Host intrusion prevention systems (HIPS)
ARP poisoning works by broadcasting a false ___, meaning the attacker must have access to the ___
MAC address; LAN
when an attacker uses a foothold in one system to access another system, this is called a ___
pivot