|Question 1||1 / 1 point|
__________ is a worm for Windows XP that downloads and executes malicious files on the compromised computer and spreads through removable storage devices.
|a. HTTP W32.Drom|
|Question 2||1 / 1 point|
__________ monitors and audits databases for security issues in real time.
|a. Selective Audit|
|Question 3||1 / 1 point|
Which of the following attacks would you choose to seize control of a legitimate user’s web application session while the session is still in progress?
|a. session hijacking|
|b. DOS attack|
|c. password sniffing|
|Question 4||1 / 1 point|
__________ viruses search all drives and connected network shares to locate files with an EXE or SCR extension.
|Question 5||1 / 1 point|
In order for traffic to get back to the attacker during session hijacking, a process called __________ is used that allows the sender to specify a particular route for the IP packet to take to the destination.
|b. source routing|
|d. TCP routing|
|Question 6||1 / 1 point|
A __________ attack occurs when an attacker sends an oversized ping packet to a victim’s device.
|Question 7||1 / 1 point|
__________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it.
|Question 8||1 / 1 point|
Which of the following definitions best describes a wrapper?
|a. A wrapper is a packet-crafting technique used to perform stealthy port scans.|
|b. A wrapper is an encryption tool used to hide messages inside image files.|
|c. A wrapper is a method of hiding a virus inside an executable file.|
|d. A wrapper is a tool used to bind a Trojan to a legitimate file.|
|Question 9||1 / 1 point|
_________ hijacking is a hacking technique that uses spoofed packets to take over a connection between a victim and a target machine.
|Question 10||1 / 1 point|
Which of the following is not a Microsoft Internet Information Services vulnerability?
|a. ::$DATA vulnerability|
|b. UFS integer overflow vulnerability|
|c. Showcode.asp vulnerability|
|d. WebDAV/RPC exploits|
|Question 11||1 / 1 point|
The __________ script allows a remote user to view the code of server-side scripts.
|Question 12||1 / 1 point|
__________ automatically scans a computer, looking for cookies created by Internet Explorer, Mozilla Firefox, and Netscape Navigator, and then displays the data stored in each one.
|a. Cookie Viewer|
|b. Cookie Explorer|
|c. Cookie Browser|
|d. Cookie Manager|
|Question 13||1 / 1 point|
__________ is an application that identifies all Bluetooth-enabled devices, their communications, and their connectivity within a given area.
|d. BlueFire Mobile|
|Question 14||1 / 1 point|
__________ is a command-line TCP/IP packet assembler/analyzer.
|d. Blaster Scan|
|Question 15||1 / 1 point|
Bluetooth-enabled devices communicate via short-range, ad hoc networks known as __________.
|Question 16||1 / 1 point|
Redirections for URLs are handled with the __________ URL handler, which can cause errors in older versions of Internet Explorer.
|Question 17||1 / 1 point|
__________ is a short-range wireless communication technology intended to replace the cables connecting portable or fixed devices while maintaining high levels of security.
|Question 18||1 / 1 point|
Which of the following types of tools would be most effective in cracking UNIX passwords?
|c. John the Ripper|
|Question 19||1 / 1 point|
__________ is a nonvoice service available with most GSM networks.
|Question 20||1 / 1 point|
Web applications have a three-layered architecture consisting of presentation, logic, and __________.
|b. data layers|
|Question 21||1 / 1 point|
After gaining access, what is the attacker’s next goal?
|a. Cover their tracks.|
|b. Start denial-of-service attacks.|
|c. Find ways to maintain access.|
|d. None of the above.|
|Question 22||1 / 1 point|
__________ hackers are information security professionals who specialize in evaluating, and defending against, threats from attackers.
|Question 23||1 / 1 point|
The Network News Transport Protocol service uses port __________.
|Question 24||1 / 1 point|
Which of the following selections lists the four phases of a penetration test?
|a. planning, recon, hack, cleanup|
|b. recon, exploit, payload, loot|
|c. planning, preattack, attack, postattack|
|d. planning, recon, attack, cleanup|
|Question 25||1 / 1 point|
__________ URLs, or intranets, are private links that only a company’s employees use.
|Question 26||1 / 1 point|
This type of port scanning technique splits a TCP header into several packets so that the packet filters cannot detect what the packets intend to do.
|a. UDP scanning|
|b. IP fragment scanning|
|c. inverse TCP flag scanning|
|d. ACK flag scanning|
|Question 27||1 / 1 point|
__________ is a simple form of attack aimed directly at the application’s business logic.
|a. Authentication hijacking|
|b. Parameter tampering|
|c. Cookie poisoning|
|d. Session poisoning|
|Question 28||1 / 1 point|
The __________ command displays the ARP table and is used to modify it.
|a. ifconfig -arp|
|c. netstat -arp|
|Question 29||1 / 1 point|
A good countermeasure against hijacking includes which of the following?
|a. application of non-Internet protocols like http to secure sessions against hijacking|
|b. use of biometrics and access tokens|
|c. enforcement of a stronger password policy|
|d. unpredictable sequence numbers|
|Question 30||1 / 1 point|
A __________, also called a packet analyzer, is a software program that can capture, log, and analyze protocol traffic over the network and decode its contents.
|Question 31||1 / 1 point|
The Java-based __________ worm spreads through Bluetooth and affects unprotected Mac OS X 10.4 systems.
|Question 32||1 / 1 point|
__________ is a method of gaining access to sensitive data in a Bluetooth-enabled device.
|Question 33||1 / 1 point|
__________ is an advanced version of More and provides key commands from the Vi text editor to enhance file viewing.
|Question 34||1 / 1 point|
__________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD.
|d. Damn Small Linux|
|Question 35||1 / 1 point|
____ is the use of Bluetooth to send messages to users without the recipients’ consent—similar to e-mail spamming.
|Question 36||1 / 1 point|
The easiest way to find a Cisco router is to run __________ from a command shell.
|Question 37||1 / 1 point|
__________ is a common and easy form of SQL injection. The technique involves evading the logon forms.
|a. Command injection|
|b. SELECT bypass|
|c. INSERT injection|
|d. Authorization bypass|
|Question 38||1 / 1 point|
__________ is a lightweight substitute for telnet that enables the execution of processes on other systems, eliminating the need for manual installation of client software.
|b. Alchemy Remote Executor|
|c. Emsa FlexInfo Pro|
|Question 39||1 / 1 point|
__________ is a small utility that lists all USB devices currently connected to a computer, as well as all previously used USB devices.
|b. USB Blocker|
|c. USB CopyNotify!|
|Question 40||1 / 1 point|
A(n) __________ is a specific way to breach the security of an IT system through a vulnerability.
|Question 41||1 / 1 point|
Private data stored by Firefox can be quickly deleted by selecting __________ in the Tools menu.
|a. Clear History|
|b. Clear Private Data|
|c. Delete Private Data|
|d. Delete History|
|Question 42||1 / 1 point|
When an ethical hacker uses nslookup, which protocol are they querying?
|Question 43||1 / 1 point|
There are several aspects to security, and the owner of a system should have confidence that the system will behave according to its specifications. This is called __________.
|Question 44||1 / 1 point|
Information on all Linux accounts is stored in the __________ and /etc/shadow files.
|Question 45||1 / 1 point|
__________ gathering is the process of accumulating information from resources like the Internet that can later be analyzed as business intelligence.
|a. Competitive intelligence|
|c. Passive information|
|Question 46||1 / 1 point|
__________ is a tool that administrators can use to test the reliability of their critical systems and determine what actions they must take to fix any problems.
|c. Selective Audit|
|Question 47||1 / 1 point|
A common technique used to hide data within image files uses the __________ technique.
|a. hex dump|
|d. big endian|
|Question 48||1 / 1 point|
__________ is the act of gathering information about the security profile of a computer system or organization, undertaken in a methodological manner.
|b. Passive information gathering|
|d. Competitive intelligence gathering|
|Question 49||1 / 1 point|
A __________ is a device that cannot function in any capacity.
|Question 50||1 / 1 point|
IT __________ are designed to evaluate an organization’s security policies and procedures.
|a. ping sweeps|
|b. vulnerability assessments|
|c. penetration tests|
|d. security audits|
|Question 51||1 / 1 point|
What phase of attack uses social engineering and dumpster diving to find information about the target?
|b. gaining access|
|Question 52||1 / 1 point|
__________ is the exploitation of an organization’s telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources.
|a. War driving|
|b. Line dialing|
|c. PBX driving|
|d. War dialing|
|Question 53||1 / 1 point|
__________ allow attackers to pass malicious code to different systems via a web application.
|a. SQL injection attacks|
|b. XSS vulnerabilities|
|c. Authentication hijacking attacks|
|d. Command injection flaws|
|Question 54||1 / 1 point|
Which website can an ethical hacker visit to see web pages from 2002?
|Question 55||1 / 1 point|
How do you defend against privilege escalation?
|a. Use encryption to protect sensitive data.|
|b. Restrict the interactive logon privileges.|
|c. Run services as unprivileged accounts.|
|d. Run users and applications on the least privileges.|
|Question 56||1 / 1 point|
__________ is a tool for performing automated attacks against web-enabled applications.
|c. Burp Intruder|
|Question 57||1 / 1 point|
__________ is a secure method of posting data to the database.
|Question 58||1 / 1 point|
__________ record the parts of the website visited and can contain identifying information.
|Question 59||1 / 1 point|
RFID __________ collision occurs when an RFID tag reader energizes numerous tags and the tags’ respective signals are reflected back to the reader simultaneously.
|Question 60||1 / 1 point|
In a hit-and-run attack, __________.
|a. the attacker constantly injects bad packets into the router|
|b. the attacker mistreats packets, resulting in traffic congestion|
|c. the attacker injects a few bad packets into the router|
|d. the attacker alters a single packet, resulting in denial of service|
|Question 61||1 / 1 point|
Which of the following statements best describes the rules of engagement for a penetration test?
|a. The rules of engagement are the systems that a tester can knock offline during a penetration test.|
|b. The rules of engagement are the agreed-upon guidelines for a penetration test, including desired code of conduct and procedures.|
|c. The rules of engagement define the service-level agreement and scope of a penetration test.|
|d. The rules of engagement include the insurance and risk management associated with third-party testing.|
|Question 62||1 / 1 point|
__________ is an HTTP authentication brute-force program. It attempts to guess passwords for basic HTTP authentication by logging in to a web server.
|d. Cain & Abel|
|Question 63||1 / 1 point|
__________ is a unique 15- or 17-digit code used to identify a mobile station to a GSM network.
|Question 64||1 / 1 point|
The __________ vulnerability is a vulnerability present in some servers that can be exploited by hackers in the browser address window and cause commands to be run on the server.
|a. malformed URL|
|b. URL injection|
|c. Unicode directory traversal|
|d. folder browsing|
|Question 65||1 / 1 point|
The information resource or asset that is being protected from attacks is usually called the __________.
|a. key value|
|b. target of evaluation|
|c. main asset|
|d. target asset|
|Question 66||1 / 1 point|
What privileges does an attacker have when running a shell after executing a successful buffer overflow against a default IIS installation on a Windows 2000 server?
|d. remote-access account|
|Question 67||1 / 1 point|
An __________ share is a hidden share that allows communication between two processes on the same system.
|Question 68||1 / 1 point|
__________ are software applications that run automated tasks over the Internet.
|Question 69||1 / 1 point|
__________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message.
|Question 70||1 / 1 point|
__________ is a tool that combines web crawling with the capability of a personal proxy.
|Question 71||1 / 1 point|
__________ occurs when hackers break into government or corporate computer systems as an act of protest.
|b. Cyber terrorism|
|d. Suicide hacking|
|Question 72||1 / 1 point|
A(n) __________ is a custom command in Linux that is a substitute for a formal command string.
|a. user string|
|b. system link|
|Question 73||1/ 1 point|
Which of the following is not a category of security assessment?
|a. security audit|
|b. rootkit detection|
|c. vulnerability assessment|
|d. penetration testing|
|Question 74||1 / 1 point|
__________ is a Microsoft-proprietary protocol that authenticates users and computers based on an authentication challenge and response.
|Question 75||1 / 1 point|
- Which of the following types of password attacks is not an online attack?
|Question 76||1 / 1 point|
__________ is a portable, battery-powered device that mediates interactions between RFID readers and RFID tags.
|a. RSA blocker tag|
|b. RFID Firewall|
|c. RFID Guardian|
|d. Kill switch|
|Question 77||1 / 1 point|
In Internet Explorer, the __________ zone is a security zone for sites that the user has designated as safe to visit.
|a. user sites|
|b. legal sites|
|c. white list|
|d. trusted sites|
|Question 78||1 / 1 point|
The __________ is due to a canonicalization error in IIS 4.0 and 5.0 that allows an attacker to use malformed URLs to access files and folders located on the logical drive that includes web folders.
|a. canonicalization vulnerability|
|b. ::$DATA vulnerability|
|c. Unicode directory traversal vulnerability|
|d. Msw3prt IPP vulnerability|
|Question 79||1/ 1 point|
The RFID __________ policy establishes the framework for many other security controls. It provides a vehicle for management to communicate its expectations regarding the RFID system and its security.
|b. physical access|
|c. secure disposal|
|Question 80||1 / 1 point|
The __________ file is used to determine which TTY devices the root user is allowed to log in to.
|Question 81||1 / 1 point|
A __________ is a program that produces its own source code as its output.
|Question 82||1 / 1 point|
Kaspersky is used as __________.
|a. a hacking tool against PDAs|
|b. a hacking tool against IPHONEs|
|c. a hacking tool against IPODs|
|d. an antivirus for Windows Mobile|
|Question 83||1 / 1 point|
__________ is a parallelized login cracker that supports numerous protocols for attack.
|d. John the Ripper|
|Question 84||1 / 1 point|
The contract agreement that describes the terms of service an outsourcer provides is known as a __________.
|a. service-level agreement (SLA)|
|b. rule of engagement|
|c. due contract|
|d. project scope statement|
|Question 85||1 / 1 point|
__________ is a collection of tools for network auditing and penetration testing.
|Question 86||1 / 1 point|
__________ is usually employed when the attacker discerns that there is a low probability that these reconnaissance activities will be detected.
|a. Social engineering|
|b. Direct information gathering|
|c. Active reconnaissance|
|d. Inactive reconnaissance|
|Question 87||1 / 1 point|
A __________ occurs when a connection between the target and host is in the established state, or in a stable state with no data transmission, or the server’s sequence number is not equal to the client’s acknowledgment number, or the client’s sequence number is not equal to the server’s acknowledgment number.
|a. synchronization state|
|b. blind hijacking|
|c. source routing|
|d. desynchronization state|
|Question 88||1 / 1 point|
__________ gathering is performed by obtaining details that are freely available on the Internet and using various other techniques, without coming into direct contact with the organization’s internal servers.
|a. Competitive intelligence|
|c. Resource record|
|d. Passive information|
|Question 89||1 / 1 point|
Ethical hackers use their knowledge and skills to __________.
|a. learn the details of computer systems and enhance their capabilities|
|b. attack government and commercial businesses|
|c. develop new programs or reverse-engineer existing software to make it more efficient|
|d. defend networks from malicious attackers|
|Question 90||1 / 1 point|
__________ is a cable modem hacking program. It performs the task of uncapping by incorporating all the uncapping steps into one program.
|b. OneStep: ZUP|
|d. Solar Winds MIB Browser|
|Question 91||1 / 1 point|
__________ is an application that, when installed on a system, runs a background process that silently copies files from any USB flash drive connected to it.
|a. USB Switchblade|
|c. USB Hacksaw|
|d. USB Copy ’em all|
|Question 92||1 / 1 point|
Firefox 126.96.36.199 cannot correctly interpret single quotation marks and spaces during authentication. This is called the __________ value of an authentication header.
|Question 93||1 / 1 point|
Tripwire protects against Trojan horse attacks by __________.
|a. blocking the port that the Trojan program is listening on|
|b. removing any Trojan horse programs found on the system|
|c. detecting unexpected changes to a system utility file that may indicate it had been replaced by a Trojan horse|
|d. quarantining any Trojan horse programs discovered on the system|
|Question 94||1 / 1 point|
Which type of penetration test is conducted with absolutely no prior knowledge of the target environment?
|a. white-box testing|
|b. gray-box testing|
|c. red-hat testing|
|d. black-box testing|
|Question 95||1 / 1 point|
__________ is a virus targeted against mobile personal digital assistant devices.
|Question 96||1 / 1 point|
__________ provides a complete view for monitoring and analyzing activity within USB host controllers, USB hubs, and USB devices.
|a. USB PC Lock|
|c. Advanced USB Monitor|
|d. Virus Chaser USB|
|Question 97||1 / 1 point|
__________ is a method in which a sniffer is used to track down a conversation between two users.
|a. A man-in-the-middle (MITM) attack|
|b. Session hijacking|
|c. IP spoofing|
|d. Network tapping|
|Question 98||1 / 1 point|
__________ allows applications to read and write various image file formats, including GIF.
|Question 99||1 / 1 point|
Once the Oracle database server has been traced, the first port of call is made to the __________ listener.
|Question 100||1 / 1 point|
Mac OS X includes __________, a collection of frameworks, APIs, and accompanying runtimes that allows for a host of open-source web, database, scripting, and development technologies.
|Question 101||1 / 1 point|
__________ is an application-layer protocol that runs on UDP and is used to maintain and manage routers, hubs, and switches on an IP network.
|Question 102||1 / 1 point|
__________ is a protocol used to create, modify, and terminate sessions such as VOIP.
|Question 103||1 / 1 point|
A __________ attack adds numbers or symbols to a dictionary file’s contents to crack a password successfully.
|d. parameter manipulation|
|Question 104||1 / 1 point|
A hacker has successfully used a tool to intercept communications between two entities and establish credentials with both sides of the connection. The two remote ends of the communication never notice that the attacker is relaying the information between the two. This is called a(n) __________ attack.
|c. MAC poisoning attack|
|Question 105||1 / 1 point|
Attackers use a technique called __________ to exploit the system by pretending to be legitimate users or different systems.
|a. identity theft|
|Question 106||1 / 1 point|
Only __________ scan is valid while scanning a Windows system.
|Question 107||1 / 1 point|
__________ reconnaissance is a hacker’s attempt to scout for or survey potential targets and then investigate the target using publicly available information.
|Question 108||1 / 1 point|
__________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server.
|Question 109||1 / 1 point|
A __________ is a device that receives digital signals and converts them into analog signals, and vice versa.
|Question 110||1 / 1 point|
__________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned third-party applications on the iPhone.
|Question 111||1 / 1 point|
Traceroute uses the __________ field in an IP packet to determine how long it takes to reach a target host and whether that host is reachable and active.
|Question 112||1 / 1 point|
While conducting an ethical penetration test in Europe, which Regional Internet Registry (RIR) would you use?
|b. RIPE NCC|
|Question 113||1 / 1 point|
Which of the following password attacks is conducted using nontechnical means?
|b. brute force|
|c. social engineering|
|d. rainbow tables|
|Question 114||1 / 1 point|
The __________ method appends data in the URL field.
|Question 115||1 / 1 point|
__________ is a programming language that permits website designers to run applications on the user’s computer.
|Question 116||1 / 1 point|
__________ is an automatic identification method that uses radio waves to identify an object.
|Question 117||1 / 1 point|
In __________-level hijacking, the attacker obtains the session IDs to get control of an existing session or to create a new, unauthorized session.
|b. data link|
|Question 118||1 / 1 point|
__________ is, simply enough, looking through an organization’s trash for any discarded sensitive information.
|a. Trash diving|
|b. Trash carving|
|c. Dumpster searching|
|d. Dumpster diving|
|Question 119||1 / 1 point|
Null sessions require access to TCP port __________.
|Question 120||1 / 1 point|
__________ is a type of computer architecture in which multiple processors share the same memory and are each assigned different tasks to perform.
|d. Symmetric multiprocessing|
|Question 121||1 / 1 point|
Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password fields with __________.
|a. a pound sign|
|b. two dashes|
|c. a single quotation mark|
|d. double quotes|
|Question 122||1 / 1 point|
Which of the following Microsoft authentication protocols is the least secure?
|a. LAN Manager|
|c. NTLM v2|
|Question 123||1 / 1 point|
Which one of the following vulnerabilities is associated with Cisco routers?
|a. SQL injection|
|b. HTTP Configuration Arbitrary Administrative Access|
|c. buffer overflow|
|d. Cisco overflow injection|
|Question 124||1 / 1 point|
The __________ are the agreed-on guidelines for a penetration test.
|a. rules of engagement|
|b. project scope statements|
|c. test requirements|
|d. service-level agreements (SLAs)|
|Question 125||1 / 1 point|
In the TCP/IP stack, the __________ layer is where applications and protocols, such as HTTP and Telnet, operate.