Filters
Question type

Study Flashcards

Passive scanners are advantageous in that they do not require vulnerability analysts to get prior approval for testing.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____ uses all the techniques and tools available to an attacker in an attempt to compromise or penetrate an organization's defenses.


A) audit
B) penetration test
C) ruleset review
D) hash

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What are "race conditions"?

Correct Answer

verifed

verified

"Race conditions" refers to situations in which two threads, processes, or applications are able to modify a resource (and therefore interfere with each other) and the programmer has not taken precautions to ensure that the desired sequence of events is completed in the proper order. From a security standpoint, an attacker is looking to exploit the condition whereby a legitimate thread or process is consumed passing a code check and the malicious code slips by unnoticed.

____ is a vulnerability scoring system designed to provide an open and standardized method for rating IT vulnerabilities.


A) OVAL
B) COBIT
C) CVE
D) CVSS

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended SQL input that can be passed to a database?


A) Rainbow attack
B) Cross-site request forgery
C) Command injection
D) Buffer overflow

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

A(n) ____________________ vulnerability scanner initiates traffic on the network in order to identify security holes.

Correct Answer

verifed

verified

The process of exploring the Internet presence of a target is sometimes called ____________________.

Correct Answer

verifed

verified

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -Uses ICMP to determine the remote OS.

Correct Answer

verifed

verified

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -When run with the -sI switch, it allows you to bounce your scan across a firewall by using one of the idle DMZ hosts as the initiator of the scan.

Correct Answer

verifed

verified

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -An enhanced Web scanner that, among other things, scans an entire Web site for valuable pieces of information, such as server names and e-mail addresses.

Correct Answer

verifed

verified

The ____ stage of the attack methodology is a systematic survey of the target organization's Internet addresses, conducted to identify the network services offered by the hosts in that range.


A) auditing
B) fingerprinting
C) activating
D) validating

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

One of the preparatory parts of the attack methodology is the collection of publicly available information about a potential target, a process known as ____.


A) sniffing
B) reconnaissance
C) auditing
D) trapping

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Probably the most popular port scanner is ____, which runs on both UNIX and Windows systems.


A) nmap
B) hping
C) wireshark
D) nipper

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

A

Because it accepts firewall and intrusion logs from many sources, ____ is often one of the first organizations to spot network anomalies, and it often traces them to specific malware or vulnerability exploits.


A) Microsoft
B) the ISC
C) Mitre
D) ISACs

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

If Web software can access parts of the underlying operating system's file system through normal URL mappings, a(n) ____ may occur.


A) DNS resolution error
B) integer overflow error
C) active network tap
D) directory traversal attack

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Allowing users to decide which mobile code to run is the best way to resolve weaknesses introduced with mobile code.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________ is a network channel or connection point in a data communications system.

Correct Answer

verifed

verified

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -Designed to crack WEP and WPA-PSK keys to allow packet sniffing and wireless network auditing.

Correct Answer

verifed

verified

H

Why should you secure open ports?

Correct Answer

verifed

verified

Because an open port is an open door and...

View Answer

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -A UNIX or Linux systems support tool that allows a remote individual to "mirror" entire Web sites.

Correct Answer

verifed

verified

Showing 1 - 20 of 49

Related Exams

Show Answer