• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
Scanning is performed in which phase of a pen test?
Pre-Attack
What will an open port return from an ACK scan?
RST (Return)
Your target system is behind a firewall. Using hping2, you craft SYN packets to send with a hop count capable of reaching the host. You then send these packets out with port numbers from 1 to 1024. What action are you performing?
Firewalking
What is the preferred communications method used with systems on a bot-net?
IRC
Which of the following best describes a distributed denial-of-service attack?
A DoS carried out by multiple systems
What does the program EliteWrap do?
Binds Trojans to legitimate files for exploration later]
What is the attack called “evil twin”?
Rogue Access Point
What is a passive wireless discovery tool?
Kismet
What is TKIP and how does it make WPA-2 a better security choice for your wireless network?
Temporal Key Integrity Protocol. It forces a key change every 10,000 packets or so.
Which of the following is true regarding WEP cracking?
Initialization vectors are small, get reused frequently, and are sent in clear text.