Cybersecurity Flashcards

(21 cards)

1
Q

Which of the following has an offset field that specifies the length of the header and data?

A

TCP Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a TCP header?

A

Transmission Control Protocol (TCP) header is the first 24 bytes of a TCP segment that contains the parameters and state of an end-to-end TCP socket. The TCP header is used to track the state of communication between two TCP endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which on of the following tools of trade is an automated, comprehensive penetration testing product for assessing the specific information security threats to an organization?

A

Canvas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following methods is used to perform server discovery?

A

Whois Lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A penetration test will show you the vulnerabilities in the target system and the risks associated with it. An educated valuation of the risk will be performed so that the vulnerabilities can be reported as High/Medium/Low risk issues. What are the two types of ‘white-box’ penetration testing?

A

Announced testing and unannounced testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are placeholders (or markers) in an HTML document that the web server will dynamically replace with data just before sending the requested documents to a browser?

A

Server Side Includes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During the process of fingerprinting a web application environment, what do you need to do in order to analyze HTTP and HTTPS request headers and the HTML source code?

A

Check the HTTP and HTML Processing by the Browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following pen testing reports provides detailed information about all the tasks performed during penetration testing?

A

Client-Side Test Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which one of the following scans starts, but does not complete the TCP handshake sequence for each port selected, and it works well for direct scanning and often works well through firewalls?

A

SYN Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network scanning is used to identify the available network resources. Which one of the following is also known as a half-open scan, because a full TCP connection is never completed and it is used to determine which ports are open and listening on a target device?

A

SYN Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The first and foremost step for a penetration test is information gathering. The main objective of this test is to gather information about the target system which can be used in a malicious manner to gain access to the target systems. Which of the following information gathering terminologies refers to gathering information through social engineering on-site visits, face to fact interviews, and direct questionnaires?

A

Active Information Gathering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements is true about Multi-Layer Intrusion Detection Systems (mIDSs)?

A

Decreases consumed employee time and increases system uptime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are running exploits against your network to test for possible vulnerabilities. To test the strength of you virus software, you load a test network to mimic your production network. Your software successfully blocks some simple macro and encrypted viruses. You decide to really test software by using virus code where the code rewrites itself entirely and the signature change from child to child, but the functionality stays the same. What type of virus is this that you are testing?

A

Metamorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following statements is true about the LM hash?

A

Disabled in Windows Vista and 7 OSs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is NOT related to the Internal Security Assessment penetration testing strategy?

A

Testing focused on the servers, infrastructure, and the underlying software, including the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A framework for security analysis is composed of a set of instructions, assumptions, and limitations to analyze and solve security concerns and develop threat free applications. Which of the following frameworks helps an organization in the evaluation of the company’s information security with that of the industrial standards?

A

Information System Security Assessment Framework

17
Q

A framework is a fundamental structure used to support and resolve complex issues. The framework that delivers an efficient set of technologies in order to develop application which are more secure in using Internet and Intranet is:

A

Microsoft Internet Security Framework

18
Q

Identify the framework that comprises of five levels to guide agency assessment of their security programs and assist in prioritizing efforts for improvement:

A

Federal Information Technology Security Assessment Framework

19
Q

NTP protocol is used to synchronize the system clocks of computers with a remote time server or time source over a network. Which one of the following ports is used by NTP as its transport layer?

20
Q

In the context of penetration testing, what does blue teaming mean?

A

A penetration test performed with the knowledge and consent of the organization’s IT staff

21
Q

A pentester is trying to gain access to a database by inserting exploited query statements with a WHERE clause. The pen tester wants to retrieve all the entries from the database using the WHERE clause from a particular table (e.g., StudentTable). What query does he need to write to retrieve the information?

A

SELECT * FROM StudentTable WHERE roll_number = “ or ‘1’ = ‘1’