examples Flashcards
(38 cards)
Which of the following files can be used to block the “internet archive” from making snapshots of a website?
Robots.txt
The strength of asymmetric encryption lies in the face that in addresses the most serious problem of symmetric encryption - -key distribution
True
Before launching an active security tool, a pen tester will always perform footprinting so that s/he can better plan a more effective attack
True
Which of the following is the primary goal of a penetration test?
primary goal of a penetration test is to determine whether a specific resource can be compromised
A penetration tester may be able to find organizations’ insecure applications by searching Google.
True
Because the User Datagram Protocol does not perform hand shaking like TCP does, it is harder to scan and enumerate
False
Which of the following command allows pen tester to view the arp cache of a windows system
Arp -a
which of the following best describes the concept of “port scanning” when it is performed as part of a pen test?
Identify services present on a system or range of systems.
Which of the following tools was designed to query the database that holds domain registration information and is also often used during footprinting?
Whois
- Which of the following tools was designed to query the database that holds domain registration information and is also often used during footprinting?
whois
- A penetration test does not normally require formal rules of engagement.?
false
- Which of the following statements describes one of the goals of “footprinting”?
a. Find information which is specifically designed to passively gain information about a target.
b. to gather information about a victim without
directly interacting and potentially providing advance notice of the attack.
c. Footprinting also generally focuses on gathering information externally, from outside the target organization
- What is the ultimate goal of performing enumeration on a system?
uncovering specific information about the system itself
- Which file system supports a feature called Alternate data Stream that a pen tester can use to hide files?
a. NTFS
Which of the following is a defining characteristic of an ethical hacker?
Someone who knows how hacking works and understands the dangers it poses but uses
those skills for good purposes; often known as a white-hat hacker.
- Which of the following is the best source for manually obtaining a target organization network range during footprinting?
a. IANA website at the Root Zone Database
- Most search engineers support the use of advanced search operators like the ones used with google Hacking
a. True
- Passive OS fingerprinting tools examine which of the following fields to try to determine a system’s OS?.
a. TTL, Fragment bit, Type of Service, Window size
- Some tcp port scan work by altering which fields in the tcp header
a. Flags (SYN/ACK/FIN/RST/PSH)
- Which of the following is installed on both windows and linux and allows the pen tester to query internet domain name servers?
nslookup
What will a pen tester see, is s/he is able to surreptitiously plug into an unused switch port during a test? (select two)
likely be able to capture network traffic, including sensitive data and credentials, using a packet sniffer or other network analysis tool.
Additionally, the penetration tester may be able to launch further attacks against other hosts on the network, depending on the network configuration and security measures in place.
SOC will be altered
- What is a pen tester’s next step after performing a port scan?
a. Infiltration and escalation
Which of the following activities can be performed when footprinting an organization?
a. Gathering information from general resources (such as Google or the organization’s website)
b. Determining the network’s logical and physical dimensions
c. Identifying active computers and devices
d. Finding open ports, active services, and access points
e. Detecting operating systems
f. Researching known vulnerabilities of running software
Which of the following best describes an “evil twin” access point? (select two)
This fake access point is used to launch a man-in the-middle attack. Attackers simply place their own access points in the same area as users and attempt to get them to log on.