• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/120

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

120 Cards in this Set

  • Front
  • Back
When conducting penetration testing, define what tool is used to identify a router using default community strings.
SNMP
Why are switches harder to identify than routers?
Because switches do not always have an IP address assigned to them
When using ACL's what happens when you deny a single protocol?
It denys all traffic
How should you conduct penetration testing?
Identify the device then conduct ports service scanning
How are routers properly configured?
Routers that are properly configured are not easy to identify, especially hose that are Internet border routers.
What scanning tool traces the route a packet take, knowing the last hop is often the router?
Traceroute
What is the secure replacement for telnet?
Secure Shell (SSH)
What is linux's version of secure shell?
Open SSH
How many run levels are there?
Seven
What utility is used to end unwanted services?
Kill
Who can run the shutdown command?
Root
What file contains the list of shared objects?
/etc/exports
What are the 3 configuration files for NFS?
/etc/hosts.deny, /etc/hosts.allow, /etc/exports
What are the 2 components of NFS?
NFS server and NFS client
What are the 2 configuration files used for TCP Wrappers?
/etc/hosts.deny and /etc/hosts.allow
What is the configuration file and directory used with Xinetd?
xinetd.d file ; /etc/xinetd.d directory
what superdaemon is used with TCP Wrappers to protect the services of the system?
Xinetd
What is a daemon that controls other daemons?
Superdaemon
What is a program that runs constantly that provides background services in LINUX?
Daemon
What is the GUI utility for viewing logs?
Log Viewer
What are the 2 logs kept by apache web server?
access_log and error_log
How do you force a refresh while using the log viewer?
By using the File Refresh Now Command or by pressing CTRL + R
What makes it possible for LINUX and Windows to share files and directories in a manner that does not require Windows clients to use anything other than their built-in networking utilities?
SAMBA
What are the 2 ways you can set permissions?
Octal Numbers and Permission Strings
What is the command used to change permissions?
chmod
Who can change ownership of files and directories?
Administrators
What is the syntax used to change permissions?
chmod <permission> <file/directory>
What is the command to change ownership?
chown
what is the syntax used to change ownership?
chown <new owner> <filename>
What is a graphical interface for managing the system (LINUX)?
webmin
What command lets an administrator identify a running process, cpu time a process takes, memory, and user associated with a the process?
ps
What command allows an administrator to see the process running interactively?
top
What is the GUI tool used for displaying system information interactively?
System Monitor
What is the permission that allows files to be executed by the owner as opposed to the user?
SetUID
What performs a similar function for groups?
SetGID
What protects files from being accidentally deleted by non-owners?
Stickybit
How do you tell when a SetUID, SetGID, and Stickybit is set?
t=stickybit is set, s in the group = GID is set, and s in user = UID is set
What is a link that points to another file, similar to a Windows shortcut?
Symbolic link
What are the 3 categories of users and the permission that can be assigned to each?
users, groups, others; read (r), write (w), execute (x), no permission (-)
What is the configuration file for the shadow file?
/etc/login.defs
What is the default encryption method for passwords in Linux?
Data encryption Standard (DES) encryption
What command is to add a group?
groupadd
What command is to add a user?
useradd
What command is used to allow users to change password?
passwd
What command is used to allow you to change or modify an existing account's information?
usermod
What command is used to allow you to change account settings related to the expiration of the account?
chage
What command is used to allow the user typing the command to change their primary group only if they are listed under that group in the /etc/group file?
newgrp
What command is used to delete users from the system?
userdel
What command is used to delete groups from the system?
groupdel
What are the 3 files associated with users and groups?
/etc/passwd file; /etc/shadow file; /etc/group file
What command delete only the current character?
x
What command delete to the end of the line?
D
What command delete the current line?
dd
What command insert before curser?
i
What command insert at the beginning of line?
I
What command insert below current line?
o
What command append, inserts beyond the cursor?
a
What command saves last changes to a file?
:w
What command quits the Vi editor?
:q
What command quits the Vi without saving?
:q!
What command save and quits the Vi?
:wq
What command will display line numbers for each line?
:set nu
What are the 3 modes of operation in VI?
command mode, Ex mode, edit mode
How do you change between the modes in the VI?
To change between the modes by pressing the ESC key
What is a program that enables you to create and manipulate character data in a computer file?
text editor
What command is used to switch between users without logging out?
su
What command searches for a string in a document and searches through an input via a pipe?
grep
What command is used to find a file?
find
What command is used to remove or delete a file?
rm
What command moves a file from one location to another and can be used to rename a file?
mv
What command is used to copy a file?
cp
What command displays the contents of a document one page at a time?
more
What command is used to combine files to a standard output, will print screen, and used to create a file?
cat
What command is used to change file timestamps, but used by itself will create a file with no text, just the filename?
touch
What command is used to make directories?
mkdir
What command is used to show a list of directories and files?
ls
What command is used to display full path of current working directory?
pwd
What command is used to change directories?
cd
What command is used to bring up the manual pages for a command?
man
What includes the root directory in the pathname when you type it in a command line?
absolute pathname
What would not include the root directory, requires that you are in the parent directory of the object you are looking for?
relative pathname
What is a program that allows the user to run programs, edit files, and navigate through the file system?
shell
What directory contains essential commands?
/bin
What directory contains system configuration files?
/etc
What directory contains shared libraries and kernel modules?
/lib
What directory contains device files?
/dev
What directory contains variable data and spooled files?
/var
What directory contains users' home directories?
/home
What directory contains boot loader files and kernel?
/boot
What is at the top of the hierarchy structure?
"/" or "root directory"
What type of file structure does the Linux OS follow?
a hierarchy directory/file structure
What is the proper administrative account for Linux?
root
Who created Linux and when did it happen?
Linus Torvalds; in 1991
What are some of the more popular UNIX-like OS's?
LINUX, HP-UNIX, Solaris, Debian, Mandrake
What software is designed to provide the capability for the detection, remediation, and reporting of vulnerabilities on Windows-based systems and applications?
Gold Disk
What are the 2 user environments that most Linux Distros ship with?
GNU Network Object Model Environment (GNOME) and K Desktop Environment (KDE)
What are the three classes of environments for Windows XP Security Guide templates?
Enterprise, stand-alone, high security
What are the two differences between Infrastructure Server Member Baseline template and Member Server Baseline template?
DHCP service and WINS services is configured to start automatically in the Infrastructure template for all three security environments
What are the two types of groups Windows supports?
Security group and Distribution group
What predefined security template specifies default security settings?
security.inf
What predefined security template specifies default security settings for a domain controller?
DC Security.inf
What predefined security template modifies permissions and registry settings to enable maximum application compatibility?
comatws.inf
What predefined security template enhances security settings that are least likely to affect application compatibility?
securedc.inf/securews.inf
What predefined security template increases the restriction on security settings?
hisecdc.inf/hisecws.inf
What predefined security template specifies permission for the root of the system drive?
rootsec.inf
What does ntds.dit store?
all Active Directory objects
There are usually how many virtual terminals (VTY) on a CISCO router?
five
What is the mechanism for identifying users before allowing access to a network component?
authentication
What is the method used to describe what a user has the right to do once he has authenticated to the router?
authorization
What is a domain that accepts the users SID as it is passed from the trusted domain?
trusting domain
What refers to a logical trust relationship between three domains?
property of transitivity
What is a protocol for mapping an IP address to a physical machine address?
ARP
What is the ACL equivalent of "any"?
The source/wildcard of 0.0.0.0/255.255.255.255
How many Cisco privileged levels are there and what are the two predefined user levels?
16 privileged levels (0-15); user EXEC= Level 1 and "enabled" mode or privileged EXEC=Level 15
What path that are actual connections between the routers?
Router path
What is manually entered into the router and defines the path to the remote network (direct route)?
Static path
What path calculate the best network path by using mathematical algorithms (path of least resistance)?
Dynamic Path
How is permission for a SID determined and authorized?
Through the ACL
Windows 2003 templates provides settings for that three environments?
Legacy client, enterprise client, High security
What is a series of bytes that uniquely identifies a software program or file?
hashing