Filters
Question type

Study Flashcards

Allowing users to decide which mobile code to run is the best way to resolve weaknesses introduced with mobile code.

Correct Answer

verifed

verified

Because it accepts firewall and intrusion logs from many sources, ____ is often one of the first organizations to spot network anomalies, and it often traces them to specific malware or vulnerability exploits.


A) Microsoft
B) the ISC
C) Mitre
D) ISACs

Correct Answer

verifed

verified

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -When run with the -sI switch, it allows you to bounce your scan across a firewall by using one of the idle DMZ hosts as the initiator of the scan.

Correct Answer

verifed

verified

A(n) ____________________ is a network channel or connection point in a data communications system.

Correct Answer

verifed

verified

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -An enhanced Web scanner that, among other things, scans an entire Web site for valuable pieces of information, such as server names and e-mail addresses.

Correct Answer

verifed

verified

What are "race conditions"?

Correct Answer

verifed

verified

"Race conditions" refers to situations in which two threads, processes, or applications are able to modify a resource (and therefore interfere with each other) and the programmer has not taken precautions to ensure that the desired sequence of events is completed in the proper order. From a security standpoint, an attacker is looking to exploit the condition whereby a legitimate thread or process is consumed passing a code check and the malicious code slips by unnoticed.

Why should you secure open ports?

Correct Answer

verifed

verified

Because an open port is an open door and...

View Answer

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -Designed to crack WEP and WPA-PSK keys to allow packet sniffing and wireless network auditing.

Correct Answer

verifed

verified

H

Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended SQL input that can be passed to a database?


A) Rainbow attack
B) Cross-site request forgery
C) Command injection
D) Buffer overflow

Correct Answer

verifed

verified

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -A UNIX or Linux systems support tool that allows a remote individual to "mirror" entire Web sites.

Correct Answer

verifed

verified

____ is a vulnerability scoring system designed to provide an open and standardized method for rating IT vulnerabilities.


A) OVAL
B) COBIT
C) CVE
D) CVSS

Correct Answer

verifed

verified

The process of exploring the Internet presence of a target is sometimes called ____________________.

Correct Answer

verifed

verified

A(n) ____ uses all the techniques and tools available to an attacker in an attempt to compromise or penetrate an organization's defenses.


A) audit
B) penetration test
C) ruleset review
D) hash

Correct Answer

verifed

verified

A(n) ____________________ vulnerability scanner initiates traffic on the network in order to identify security holes.

Correct Answer

verifed

verified

Probably the most popular port scanner is ____, which runs on both UNIX and Windows systems.


A) nmap
B) hping
C) wireshark
D) nipper

Correct Answer

verifed

verified

A

One of the preparatory parts of the attack methodology is the collection of publicly available information about a potential target, a process known as ____.


A) sniffing
B) reconnaissance
C) auditing
D) trapping

Correct Answer

verifed

verified

If Web software can access parts of the underlying operating system's file system through normal URL mappings, a(n) ____ may occur.


A) DNS resolution error
B) integer overflow error
C) active network tap
D) directory traversal attack

Correct Answer

verifed

verified

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -Uses ICMP to determine the remote OS.

Correct Answer

verifed

verified

The ____ stage of the attack methodology is a systematic survey of the target organization's Internet addresses, conducted to identify the network services offered by the hosts in that range.


A) auditing
B) fingerprinting
C) activating
D) validating

Correct Answer

verifed

verified

Passive scanners are advantageous in that they do not require vulnerability analysts to get prior approval for testing.

Correct Answer

verifed

verified

Showing 1 - 20 of 49

Related Exams

Show Answer