Test Out Domain 2 Flashcards

(22 cards)

1
Q

What does Nikto software do?

A

is a web server scanner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does OpenVAS do?

A

is a vulnerability scanner that has more than 50,000 vulnerability tests with daily updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Nessus do?

A
  • allows for customized scans that are scheduled as convenient. It also recommends steps to remediate found vulnerabilities.
  • offers scanning on mobile devices and lets you know which devices are unauthorized or non-compliant.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does NetScan do?

A

is a tool that provides discovery through network and port scanning. It can find vulnerabilities, security flaws, and open ports on your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Scout Suite do?

A

an open-source multi-cloud security auditing tool that supports AWS, Azure, and GCP environments. It assesses the security posture of cloud environments and provides a concise view of potential security risks and misconfigurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does IDA Pro do?

A

is a disassembler tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does PEStudio do?

A

is a debugger tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does 010 Editor do?

A

is a hex editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does Haxinator do?

A

is a hex editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Prowler?

A

Prowler is an open-source security tool that helps organizations evaluate their Amazon Web Services (AWS) infrastructure and ensure it adheres to industry best practices and compliance standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Suricata?

A

is an open-source network threat detection engine that provides intrusion detection (IDS), intrusion prevention (IPS), and network security monitoring (NSM) functionalities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CVSS uses which metrics?

A

base, temporal, and environmental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Waht is OWASP ZAP?

A

(Zed Attack Proxy) uses an on-path design to scan and inspect the data transmitted between a web server and a web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Arachni?

A

is an open-source, feature-rich, modular web application security testing framework. It is specifically to identify security vulnerabilities in web applications and provide support for automated testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Colasoft?

A

is a packet crafting software program that can be used to modify flags and adjust other packet content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Where is OpenVAS from?

A

is an open-source (free) software developed from the Nessus codebase before Nessus became commercial software. Greenbone manages the scanner and is also available as a commercial product.

17
Q

What is the nmap command to generate a decoy?

18
Q

Corrective controls

A

act to eliminate or reduce the impact of an intrusion event. The company should use corrective controls after the data breach to reduce the attack’s impact. Specifically, they must stop displaying customer information on the website.

19
Q

Responsive controls

A

serve to direct corrective actions enacted after an incident occurs. Responsive controls must exist before an incident occurs to be useful, making corrective controls the appropriate mitigation.

20
Q

Currports lists all open

A

UDP and TCP ports on your computer. It also provides information about which process opened the port, which user created the process, and what time it was created.

21
Q

What is Maltego?

A

is a very sophisticated visualization tool that helps investigators quickly identify relationships among entities of many types. As a result, Maltego can help in many investigations, from people and social engineering to malware analysis.

22
Q

What is Pacu?

A

is an exploitation framework and would be useful for the consultants to evaluate the security of an Amazon Web Services (AWS) environment, including attempts to gain access.