Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
120 Cards in this Set
- Front
- Back
When conducting penetration testing, define what tool is used to identify a router using default community strings.
|
SNMP
|
|
Why are switches harder to identify than routers?
|
Because switches do not always have an IP address assigned to them
|
|
When using ACL's what happens when you deny a single protocol?
|
It denys all traffic
|
|
How should you conduct penetration testing?
|
Identify the device then conduct ports service scanning
|
|
How are routers properly configured?
|
Routers that are properly configured are not easy to identify, especially hose that are Internet border routers.
|
|
What scanning tool traces the route a packet take, knowing the last hop is often the router?
|
Traceroute
|
|
What is the secure replacement for telnet?
|
Secure Shell (SSH)
|
|
What is linux's version of secure shell?
|
Open SSH
|
|
How many run levels are there?
|
Seven
|
|
What utility is used to end unwanted services?
|
Kill
|
|
Who can run the shutdown command?
|
Root
|
|
What file contains the list of shared objects?
|
/etc/exports
|
|
What are the 3 configuration files for NFS?
|
/etc/hosts.deny, /etc/hosts.allow, /etc/exports
|
|
What are the 2 components of NFS?
|
NFS server and NFS client
|
|
What are the 2 configuration files used for TCP Wrappers?
|
/etc/hosts.deny and /etc/hosts.allow
|
|
What is the configuration file and directory used with Xinetd?
|
xinetd.d file ; /etc/xinetd.d directory
|
|
what superdaemon is used with TCP Wrappers to protect the services of the system?
|
Xinetd
|
|
What is a daemon that controls other daemons?
|
Superdaemon
|
|
What is a program that runs constantly that provides background services in LINUX?
|
Daemon
|
|
What is the GUI utility for viewing logs?
|
Log Viewer
|
|
What are the 2 logs kept by apache web server?
|
access_log and error_log
|
|
How do you force a refresh while using the log viewer?
|
By using the File Refresh Now Command or by pressing CTRL + R
|
|
What makes it possible for LINUX and Windows to share files and directories in a manner that does not require Windows clients to use anything other than their built-in networking utilities?
|
SAMBA
|
|
What are the 2 ways you can set permissions?
|
Octal Numbers and Permission Strings
|
|
What is the command used to change permissions?
|
chmod
|
|
Who can change ownership of files and directories?
|
Administrators
|
|
What is the syntax used to change permissions?
|
chmod <permission> <file/directory>
|
|
What is the command to change ownership?
|
chown
|
|
what is the syntax used to change ownership?
|
chown <new owner> <filename>
|
|
What is a graphical interface for managing the system (LINUX)?
|
webmin
|
|
What command lets an administrator identify a running process, cpu time a process takes, memory, and user associated with a the process?
|
ps
|
|
What command allows an administrator to see the process running interactively?
|
top
|
|
What is the GUI tool used for displaying system information interactively?
|
System Monitor
|
|
What is the permission that allows files to be executed by the owner as opposed to the user?
|
SetUID
|
|
What performs a similar function for groups?
|
SetGID
|
|
What protects files from being accidentally deleted by non-owners?
|
Stickybit
|
|
How do you tell when a SetUID, SetGID, and Stickybit is set?
|
t=stickybit is set, s in the group = GID is set, and s in user = UID is set
|
|
What is a link that points to another file, similar to a Windows shortcut?
|
Symbolic link
|
|
What are the 3 categories of users and the permission that can be assigned to each?
|
users, groups, others; read (r), write (w), execute (x), no permission (-)
|
|
What is the configuration file for the shadow file?
|
/etc/login.defs
|
|
What is the default encryption method for passwords in Linux?
|
Data encryption Standard (DES) encryption
|
|
What command is to add a group?
|
groupadd
|
|
What command is to add a user?
|
useradd
|
|
What command is used to allow users to change password?
|
passwd
|
|
What command is used to allow you to change or modify an existing account's information?
|
usermod
|
|
What command is used to allow you to change account settings related to the expiration of the account?
|
chage
|
|
What command is used to allow the user typing the command to change their primary group only if they are listed under that group in the /etc/group file?
|
newgrp
|
|
What command is used to delete users from the system?
|
userdel
|
|
What command is used to delete groups from the system?
|
groupdel
|
|
What are the 3 files associated with users and groups?
|
/etc/passwd file; /etc/shadow file; /etc/group file
|
|
What command delete only the current character?
|
x
|
|
What command delete to the end of the line?
|
D
|
|
What command delete the current line?
|
dd
|
|
What command insert before curser?
|
i
|
|
What command insert at the beginning of line?
|
I
|
|
What command insert below current line?
|
o
|
|
What command append, inserts beyond the cursor?
|
a
|
|
What command saves last changes to a file?
|
:w
|
|
What command quits the Vi editor?
|
:q
|
|
What command quits the Vi without saving?
|
:q!
|
|
What command save and quits the Vi?
|
:wq
|
|
What command will display line numbers for each line?
|
:set nu
|
|
What are the 3 modes of operation in VI?
|
command mode, Ex mode, edit mode
|
|
How do you change between the modes in the VI?
|
To change between the modes by pressing the ESC key
|
|
What is a program that enables you to create and manipulate character data in a computer file?
|
text editor
|
|
What command is used to switch between users without logging out?
|
su
|
|
What command searches for a string in a document and searches through an input via a pipe?
|
grep
|
|
What command is used to find a file?
|
find
|
|
What command is used to remove or delete a file?
|
rm
|
|
What command moves a file from one location to another and can be used to rename a file?
|
mv
|
|
What command is used to copy a file?
|
cp
|
|
What command displays the contents of a document one page at a time?
|
more
|
|
What command is used to combine files to a standard output, will print screen, and used to create a file?
|
cat
|
|
What command is used to change file timestamps, but used by itself will create a file with no text, just the filename?
|
touch
|
|
What command is used to make directories?
|
mkdir
|
|
What command is used to show a list of directories and files?
|
ls
|
|
What command is used to display full path of current working directory?
|
pwd
|
|
What command is used to change directories?
|
cd
|
|
What command is used to bring up the manual pages for a command?
|
man
|
|
What includes the root directory in the pathname when you type it in a command line?
|
absolute pathname
|
|
What would not include the root directory, requires that you are in the parent directory of the object you are looking for?
|
relative pathname
|
|
What is a program that allows the user to run programs, edit files, and navigate through the file system?
|
shell
|
|
What directory contains essential commands?
|
/bin
|
|
What directory contains system configuration files?
|
/etc
|
|
What directory contains shared libraries and kernel modules?
|
/lib
|
|
What directory contains device files?
|
/dev
|
|
What directory contains variable data and spooled files?
|
/var
|
|
What directory contains users' home directories?
|
/home
|
|
What directory contains boot loader files and kernel?
|
/boot
|
|
What is at the top of the hierarchy structure?
|
"/" or "root directory"
|
|
What type of file structure does the Linux OS follow?
|
a hierarchy directory/file structure
|
|
What is the proper administrative account for Linux?
|
root
|
|
Who created Linux and when did it happen?
|
Linus Torvalds; in 1991
|
|
What are some of the more popular UNIX-like OS's?
|
LINUX, HP-UNIX, Solaris, Debian, Mandrake
|
|
What software is designed to provide the capability for the detection, remediation, and reporting of vulnerabilities on Windows-based systems and applications?
|
Gold Disk
|
|
What are the 2 user environments that most Linux Distros ship with?
|
GNU Network Object Model Environment (GNOME) and K Desktop Environment (KDE)
|
|
What are the three classes of environments for Windows XP Security Guide templates?
|
Enterprise, stand-alone, high security
|
|
What are the two differences between Infrastructure Server Member Baseline template and Member Server Baseline template?
|
DHCP service and WINS services is configured to start automatically in the Infrastructure template for all three security environments
|
|
What are the two types of groups Windows supports?
|
Security group and Distribution group
|
|
What predefined security template specifies default security settings?
|
security.inf
|
|
What predefined security template specifies default security settings for a domain controller?
|
DC Security.inf
|
|
What predefined security template modifies permissions and registry settings to enable maximum application compatibility?
|
comatws.inf
|
|
What predefined security template enhances security settings that are least likely to affect application compatibility?
|
securedc.inf/securews.inf
|
|
What predefined security template increases the restriction on security settings?
|
hisecdc.inf/hisecws.inf
|
|
What predefined security template specifies permission for the root of the system drive?
|
rootsec.inf
|
|
What does ntds.dit store?
|
all Active Directory objects
|
|
There are usually how many virtual terminals (VTY) on a CISCO router?
|
five
|
|
What is the mechanism for identifying users before allowing access to a network component?
|
authentication
|
|
What is the method used to describe what a user has the right to do once he has authenticated to the router?
|
authorization
|
|
What is a domain that accepts the users SID as it is passed from the trusted domain?
|
trusting domain
|
|
What refers to a logical trust relationship between three domains?
|
property of transitivity
|
|
What is a protocol for mapping an IP address to a physical machine address?
|
ARP
|
|
What is the ACL equivalent of "any"?
|
The source/wildcard of 0.0.0.0/255.255.255.255
|
|
How many Cisco privileged levels are there and what are the two predefined user levels?
|
16 privileged levels (0-15); user EXEC= Level 1 and "enabled" mode or privileged EXEC=Level 15
|
|
What path that are actual connections between the routers?
|
Router path
|
|
What is manually entered into the router and defines the path to the remote network (direct route)?
|
Static path
|
|
What path calculate the best network path by using mathematical algorithms (path of least resistance)?
|
Dynamic Path
|
|
How is permission for a SID determined and authorized?
|
Through the ACL
|
|
Windows 2003 templates provides settings for that three environments?
|
Legacy client, enterprise client, High security
|
|
What is a series of bytes that uniquely identifies a software program or file?
|
hashing
|