Final Flashcards
(157 cards)
Penetration testing can create ethical, technical, and privacy concerns for a company’s management team. What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?
create a contractual agreement
What professional level security certification did the “International Information Systems Security Certification Consortium” (ISC2) develop?
Certified Information Systems Security Professional (CISSP)
What name is given to people who break into computer systems with the sole purpose to steal or destroy data?
Crackers
What organization disseminates research documents on computer and network security worldwide at no cost?
SANS
What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM) as its standardized methodology?
OPST
What port does the Simple Mail Transfer Protocol, or SMTP service use?
25
What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?
Transport Layer
To retrieve e-mail from a mail server, you most likely access port 119.
TRUE OR FALSE
False
In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?
Transport
An octal digit can be represented with only three bits because the largest digit in octal is seven.
TRUE OR FALSE
True
A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?
worm
In a buffer overflow attack, an attacker finds a vulnerability in poorly written code that doesn’t check for a defined amount of memory space use.
TRUE OR FALSE
TRUE
What type of attack is occurring when an attacker places themselves between two parties and manipulates messages being passed back and forth?
Man-in-the-Middle
Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?
signatures
What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?
Virus
What social engineering tactic can be utilized to acquire old notes that may contain written passwords or other items that document important information?
Dumpster driving
To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?
nc -h
What is the passive process of finding information on a company’s network called?
Footprinting
What HTTP method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body?
HEAD
When an individual attempts to discover as much information legally possible about their competition, what information gathering technique are they performing?
Competitive intelligence
When a TCP three-way handshake ends, both parties send what type of packet to end the connection?
FIN
In a NULL scan, all packet flags are turned on.
TRUE OR FALSE
FALSE
Attackers typically use ACK scans to get past a firewall or other filtering devices.
TRUE OR FALSE
TRUE
In any *NIX system, after saving a script named “script_name,” you need to make it executable so that you can run it. Which command will accomplish this task from the command line?
chmod +x script_name