Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
Scanning is performed in which phase of a pen test?
|
Pre-Attack
|
|
What will an open port return from an ACK scan?
|
RST (Return)
|
|
Your target system is behind a firewall. Using hping2, you craft SYN packets to send with a hop count capable of reaching the host. You then send these packets out with port numbers from 1 to 1024. What action are you performing?
|
Firewalking
|
|
What is the preferred communications method used with systems on a bot-net?
|
IRC
|
|
Which of the following best describes a distributed denial-of-service attack?
|
A DoS carried out by multiple systems
|
|
What does the program EliteWrap do?
|
Binds Trojans to legitimate files for exploration later]
|
|
What is the attack called “evil twin”?
|
Rogue Access Point
|
|
What is a passive wireless discovery tool?
|
Kismet
|
|
What is TKIP and how does it make WPA-2 a better security choice for your wireless network?
|
Temporal Key Integrity Protocol. It forces a key change every 10,000 packets or so.
|
|
Which of the following is true regarding WEP cracking?
|
Initialization vectors are small, get reused frequently, and are sent in clear text.
|