CIS 102 – College Essay
170 test answers
Unlock all answers in this set
Unlock answers 170question
What type of penetration testing is most often used when an organization wants to closely simulate how an attacker views a system?
answer
Black-box testing
Unlock the answer
question
Which of the following is NOT considered one of the three types of controls you can use in risk mitigation?
answer
Distribution
Unlock the answer
question
Which of the following refers to a piece of software, a tool, or a technique that targets or takes advantage of a vulnerability?
answer
Exploit
Unlock the answer
question
Which of the following refers to the structured and methodical means of investigating, uncovering, attacking, and reporting on a target system's strengths and vulnerabilities?
answer
Penetration testing
Unlock the answer
question
Which of the following tests includes anything that targets equipment or facilities and can also include actions against people, such as social engineering-related threats?
answer
Physical attack
Unlock the answer
question
Which of the following tests is designed to simulate an attack against technology from either the inside or the outside depending on the goals and intentions of the client?
answer
Technical attack
Unlock the answer
question
A hierarchical system of servers and services specifically designed to translate IP addresses into domain names (forward lookups) as well as the reverse (reverse lookups) is called:
answer
Domain Name Service (DNS).
Unlock the answer
question
Blocking everything and allowing only what is needed is known as:
answer
the deny-all principle.
Unlock the answer
question
Repeaters, hubs, bridges, and switches are part of:
answer
Physical or Network Access Layer equipment
Unlock the answer
question
The act of a third party covertly monitoring Internet and telephone conversations is called:
answer
wiretapping.
Unlock the answer
question
Which of the following is a connectionless protocol that offers speed and low overhead as its primary advantage?
answer
User Datagram Protocol
Unlock the answer
question
Which of the following is a largely obsolete protocol that was originally designed for use in connections established by modems?
answer
Serial Line Interface Protocol
Unlock the answer
question
Which of the following is method of separating a network into segments for better management and performance?
answer
Subnet mask
Unlock the answer
question
Which of the following offers the greatest level of security for wireless networks?
answer
Wi-Fi Protected Access 2 (WPA2)
Unlock the answer
question
Which of the following regulates the flow of traffic between different networks?
answer
A firewall
Unlock the answer
question
Which routing protocol calculates the best path to a target network by one or more metrics such as delay, speed, or bandwidth?
answer
Link state
Unlock the answer
question
A hash algorithm can be compromised with a collision, which occurs when two separate and different messages or inputs pass through the hashing process and generate:
answer
the same value.
Unlock the answer
question
Cryptography provides an invaluable service to security by providing all of the following except:
answer
the ability to hack into systems and remain undetected.
Unlock the answer
question
In using symmetric encryption to encrypt a given piece of information, there are two different mechanisms an algorithm can use, either:
answer
a stream cipher or a block cipher.
Unlock the answer
question
The main function or capability of certificate authorities (CAs) is to:
answer
generate key pairs and bind a user's identity to the public key.
Unlock the answer
question
To create a digital signature, two steps take place that result in the actual signature that is sent with data. In the first step, the message or information to be sent is passed through a hashing algorithm that creates a hash to:
answer
private key as the key in the encryption process.
Unlock the answer
question
What type of encryption uses the same key to encrypt and to decrypt information?
answer
Symmetric encryption
Unlock the answer
question
Which of the following is used to bring trust, integrity, and security to electronic transactions?
answer
Public key infrastructure
Unlock the answer
question
Which of the following terms refers to functions employed in asymmetric encryption that are easy to compute in one direction, but tough to compute in the other?
answer
Trapdoor functions
Unlock the answer
question
Which of the following terms refers to the ability to verify that information has not been altered and has remained in the form originally intended by the creator?
answer
Integrity
Unlock the answer
question
Which password attack method tries every possible sequence of keys until the correct one is found?
answer
Brute-force password attack
Unlock the answer
question
Automated methods for obtaining network range information:
answer
are faster than manual methods.
Unlock the answer
question
Countermeasures an organization can take to thwart footprinting of the organization's Web site include all of the following except:
answer
adding unnecessary information to the Web site to throw attackers off the trail.
Unlock the answer
question
Countermeasures that an organization can take regarding protecting domain information include:
answer
employing a commonly available proxy service to block the access of sensitive domain data.
Unlock the answer
question
Google hacking can be thwarted to a high degree by:
answer
sanitizing information that is available publicly whenever possible.
Unlock the answer
question
The manual method of obtaining network range information requires the attacker to visit at least one or more of the Regional Internet Registries (RIRs), which are responsible for:
answer
management, distribution, and registration of public IP addresses within their respective assigned regions.
Unlock the answer
question
Which of the following is NOT one of the Internet sources that hackers use to gather information about a company or its employees?
answer
Internet protocol resources
Unlock the answer
question
Which of the following is specifically designed to passively gain information about a target?
answer
Footprinting
Unlock the answer
question
Which of the following refers to a software program used to determine the path a data packet traverses to get to a specific IP address?
answer
Traceroute
Unlock the answer
question
Which of the following refers to is the protocol designed to query databases to look up and identify the registrant of a domain name?
answer
Whois
Unlock the answer
question
Which step(s) in the information-gathering process does footprinting cover?
answer
Gathering information and determining the network range
Unlock the answer
question
An attacker using friendliness, trust, impersonation, and empathy, to get a victim to do what they want him or her to do is participating in:
answer
persuasion/coercion.
Unlock the answer
question
An attacker who sets up such a realistic persona that the victim volunteers information is participating in:
answer
reverse social engineering.
Unlock the answer
question
Attackers observing victims as they enter codes at a bank cash machine or a gas pump are participating in:
answer
shoulder surfing.
Unlock the answer
question
Which of the following gives Facebook users flexibility as to who is allowed to see which portions of a profile?
answer
Limited Profile Settings
Unlock the answer
question
Common scams used in social media include all of the following EXCEPT:
answer
reaching out to users to raise money for a legitimate charity.
Unlock the answer
question
Which of the following is NOT considered a common mistake that people make when using social media?
answer
Posting so little personal information that others do not want to "follow" or "friend" them
Unlock the answer
question
Which of the following is NOT considered a sensible guideline to follow when using social networking sites?
answer
Posting so little personal information that others do not want to "follow" or "friend" them
Unlock the answer
question
Which of the following is true regarding account passwords?
answer
Passwords should have at least one number and one special character.
Unlock the answer
question
Which of the following statements is NOT true regarding over-sharing of company activities?
answer
a. Over-sharing of company activities typically is conducted by disgruntled employees who are intentionally trying to harm their company.
Unlock the answer
question
Which of the following statements is NOT true regarding social engineering?
answer
Social engineering has different goals and objectives than other types of hacking.
Unlock the answer
question
Which of the following is NOT a network mapping tool?
answer
Conquistador
Unlock the answer
question
A technique that has existed for more than 25 years as a footprinting tool and involves the use of modems is called:
answer
Wardialing
Unlock the answer
question
The practice of identifying the operating system of a networked device through either passive or active techniques is called:
answer
OS identification.
Unlock the answer
question
Which of the following excels at allowing the security professional to find services that have been redirected from standard ports?
answer
THC-Amap
Unlock the answer
question
Which of the following is a form of OS fingerprinting that involves actively requesting information from the target system?
answer
Active fingerprinting
Unlock the answer
question
Which of the following is a method of identifying the OS of a targeted computer or device in which no traffic or packets are injected into the network and attackers simply listen to and analyze existing traffic?
answer
Passive fingerprinting
Unlock the answer
question
Which of the following is a Windows-based port scanner designed to scan TCP and UDP ports, perform ping scans, run Whois queries, and use Traceroute?
answer
Banner
Unlock the answer
question
Which of the following is the process of locating wireless access points and gaining information about the configuration of each?
answer
Wardriving
Unlock the answer
question
Which of the following reveals telling information such as version and service data that will help an attacker?
answer
Banner
Unlock the answer
question
Which of the following techniques is not used to locate network access points, but to reveal the presence of access points to others?
answer
Warchalking
Unlock the answer
question
A form of offline attack that functions much like a dictionary attack, but with an extra level of sophistication, is a:
answer
hybrid attack.
Unlock the answer
question
An attacker can deprive the system owner of the ability to detect the activities that have been carried out by:
answer
disabling auditing.
Unlock the answer
question
Cain and Abel, John the Ripper, Pandora, and Pwdump3 are examples of:
answer
password crackers
Unlock the answer
question
Precomputed hashes are used in an attack type known as a:
answer
rainbow table.
Unlock the answer
question
Shoulder surfing, keyboard sniffing, and social engineering are considered:
answer
nontechnical attacks
Unlock the answer
question
The database on the local Windows system that is used to store user account information is called:
answer
the Security Account Manager (SAM)
Unlock the answer
question
The unique ID that is assigned to each user account in Windows that identifies the account or group is called a(n):
answer
security identifier (SID)
Unlock the answer
question
Which of the following are considered passive online attacks?
answer
Packet sniffing, or man-in-the-middle and replay attacks
Unlock the answer
question
Which of the following is NOT true regarding the use of a packet sniffer?
answer
Packet sniffing involves the attacker capturing traffic from both ends of the communication between two hosts.
Unlock the answer
question
Which of the following refers to a utility designed to detect Simple Network Management Protocol (SNMP)-enabled devices on a network and locate and identify devices that are vulnerable to SNMP attacks?
answer
SNScan
Unlock the answer
question
Common database vulnerabilities include all of the following EXCEPT:
answer
strong audit log settings.
Unlock the answer
question
Common forms of distributed denial of service (DDoS) attacks include all of the following EXCEPT:
answer
Buffer overflows
Unlock the answer
question
Exploitative behaviors against Web applications include all of the following EXCEPT:
answer
man-in-the-middle attacks.
Unlock the answer
question
NGSSquirreL and AppDetective are:
answer
pieces of software for performing audits on databases.
Unlock the answer
question
Offloading services from the local intranet to the Internet itself can be done by the use of:
answer
cloud computing.
Unlock the answer
question
Security issues that can arise in cloud computing that are above and beyond those with standard environments include all of the following EXCEPT:
answer
detectability.
Unlock the answer
question
SQLPing and SQLRecon are:
answer
tools for locating rogue or unknown database installations.
Unlock the answer
question
The categories of Web application vulnerabilities include all of the following EXCEPT:
answer
end-user education.
Unlock the answer
question
Typical categories of databases include all of the following EXCEPT:
answer
applied database.
Unlock the answer
question
Web applications that require a user to log on prior to gaining access can track information relating to improper or incorrect logons; this information typically lists entries such as all of the following EXCEPT:
answer
entry of a valid user ID and password.
Unlock the answer
question
What type of attack relies on a variation of the input validation attack but has the goal of going after a user instead of the application or data.
answer
Cross-site scripting (XSS)
Unlock the answer
question
Which category of risk inherent with Web servers includes risks such as the ability to steal information from a server, run scripts or executables remotely, enumerate servers, and carry out denial of service (DoS) attacks?
answer
Defects and misconfiguration risks
Unlock the answer
question
Which class of individuals is primarily concerned with the security of the Web server because it can provide an easy means of getting into the local network?
answer
Server administrator
Unlock the answer
question
Which class of individuals works the most with the server and is primarily concerned with access to content and services?
answer
Server administrator
Unlock the answer
question
Which of the following is a hierarchical, structured format for storing information for later retrieval, modification, management, and other purposes?
answer
Database
Unlock the answer
question
Which of the following is NOT considered a vulnerability of Web servers?
answer
Poor end-user training
Unlock the answer
question
Which of the following refers to a language used to interact with databases, making it possible to access, manipulate, and change data?
answer
Structured Query Language (SQL)
Unlock the answer
question
Which of the following refers to encryption using short keys or keys that are poorly designed and implemented that can allow an attacker to decrypt data easily and gain unauthorized access to the information?
answer
Weak ciphers or encoding algorithms
Unlock the answer
question
Which of the following statements is NOT true regarding Structured Query Language (SQL) injections?
answer
They are specific to only one vendor's database and cannot force the application to reveal restricted information.
Unlock the answer
question
Which of the following statements is NOT true regarding the protection of databases?
answer
Very few tools are available to locate, audit, and ultimately protect databases.
Unlock the answer
question
A process where communications are redirected to different ports than they would normally be destined for is called:
answer
port redirection.
Unlock the answer
question
A section of the hard drive record responsible for assisting in locating the operating system to boot the computer is called the:
answer
master boot records (MBRs).
Unlock the answer
question
A software development kit specifically designed to facilitate the design and development of Trojans is called a:
answer
Trojan construction kit.
Unlock the answer
question
The part of a hard drive or removable media that is used to boot programs is called the:
answer
boot sector.
Unlock the answer
question
Which of the following is a malware program designed to replicate without attaching to or infecting other files on a host system?
answer
Worm
Unlock the answer
question
Which of the following is a next-generation Trojan tool that was designed to accept customized, specially designed plug-ins?
answer
Back Orifice (BO2K)
Unlock the answer
question
Which of the following is a remote access Trojan authored entirely in Delphi that uses TCP port 26097 by default?
answer
Let Me Rule
Unlock the answer
question
Which of the following is a U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?
answer
Trusted Computer System Evaluation Criteria (TCSEC)
Unlock the answer
question
Which of the following is malware that looks legitimate but hides a payload that does something unwanted?
answer
Trojan
Unlock the answer
question
Which of the following is NOT a type of malware?
answer
Gameware
Unlock the answer
question
Which of the following is NOT one of the key goals of a backdoor?
answer
To obtain a Trojan construction kit
Unlock the answer
question
Which of the following laws was originally passed to address federal computer-related offenses and the cracking of computer systems?
answer
The Computer Fraud and Abuse Act of 1986
Unlock the answer
question
Which of the following statements is NOT true about dictionary-based virus detection?
answer
This method can detect both viruses that it knows about and those it does not know about.
Unlock the answer
question
Which of the following terms refers to any software that is inherently hostile, intrusive, or annoying in its operation?
answer
Malware
Unlock the answer
question
Which of the following types of malware is a piece of code or software that spreads from system to system by attaching itself to other files and is activated when the file is accessed?
answer
Macro virus
Unlock the answer
question
Which of the following types of viruses infects and operates through the use of a programming language built into applications such as Microsoft Office in the form of Visual Basic for Applications (VBA)?
answer
Macro virus
Unlock the answer
question
Which of the following types of viruses infects using multiple attack vectors, including the boot sector and executable files on the hard drive?
answer
Logic bomb
Unlock the answer
question
Which of the following types of viruses is a piece of code or software designed to lie in wait on a system until a specified event occurs?
answer
Logic bomb
Unlock the answer
question
Which of the following types of viruses is designed to change their code and "shape" to avoid detection by virus scanners, which would look for a specific virus code and not the new version?
answer
Polymorphic virus
Unlock the answer
question
Which one of the following is NOT a goal of Trojans?
answer
Replicating
Unlock the answer
question
A group of infected systems that are used to collectively attack another system is called a:
answer
botnet
Unlock the answer
question
All of the following are commonly used tools to perform session hijacking EXCEPT:
answer
Smurf.
Unlock the answer
question
Botnets are used to perform all of the following attacks EXCEPT:
answer
passive session hijacking.
Unlock the answer
question
Countermeasures that can be used to defeat sniffing include all of the following EXCEPT:
answer
Media Access Control (MAC) flooding.
Unlock the answer
question
Media Access Control (MAC) flooding and Address Resolution Protocol (ARP) poisoning are:
answer
methods of bypassing a switch to perform sniffing.
Unlock the answer
question
What type of sniffing takes place on networks such as those that have a hub as the connectivity device?
answer
Passive sniffing
Unlock the answer
question
Which of the following is NOT one of the steps an attacker must perform to conduct a successful session hijacking?
answer
Inject packets into the network prior to the authentication process.
Unlock the answer
question
Which of the following statements is NOT true regarding Address Resolution Protocol (ARP) poisoning?
answer
It cannot be used to alter data in transmission or tap Voice over IP (VoIP) phone calls.
Unlock the answer
question
Which of the following statements is NOT true regarding passive session hijacking?
answer
In passive session hijacking, the attacker assumes the role of the party he has displaced.
Unlock the answer
question
With a hub connectivity device in place, all traffic can be seen by all other stations, which can be also referred to as all stations being on the same:
answer
collision domain
Unlock the answer
question
A piece of media that contains a complete and bootable operating system is called a(n):
answer
Live CD.
Unlock the answer
question
One of the bigger benefits of a Live CD is that a user can boot a computer off a Live CD:
answer
without making any alterations to the existing operating system on the computer.
Unlock the answer
question
Which of the following are used to specify filenames or other targets that fine-tune the action of the command in Linux?
answer
Arguments
Unlock the answer
question
Which of the following is NOT a common use of live distributions?
answer
Increasing RAM
Unlock the answer
question
Which of the following is NOT one of the more common distributions of Linux?
answer
Timbuktu
Unlock the answer
question
Which of the following Linux commands is used to copy files from location to location?
answer
cp
Unlock the answer
question
Which of the following Linux commands is used to display the current location of the user within the Linux directory structure?
answer
pwd
Unlock the answer
question
Which of the following Linux commands is used to remove or delete empty directories from the Linux filesystem?
answer
rmdir
Unlock the answer
question
Which of the following statements is NOT true about Kali Linux?
answer
It is designed to be used as a desktop replacement operating system.
Unlock the answer
question
Which of the following will happen after using a Live CD, ejecting the media, and rebooting the system from the hard drive?
answer
v
Unlock the answer
question
A setup created by wireless networking technologies that are designed to extend or replace wired networks is called:
answer
wireless local area network (WLAN).
Unlock the answer
question
The 802.11n standard uses a new method of transmitting signals, which can transmit multiple signals across multiple antennas. This new method of transmitting signals is called:
answer
multiple input and multiple output (MIMO).
Unlock the answer
question
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 family of standards, which range from 802.11a to 802.11n are known collectively in standard jargon as:
answer
Wi-Fi.
Unlock the answer
question
Which of the following is a capability implemented through Bluetooth technology, designed to reach a maximum range on average of 10 meters or 30 feet?
answer
Personal area network (PAN)
Unlock the answer
question
Which of the following is NOT a countermeasure to threats against wireless LANs?
answer
Promiscuous clients
Unlock the answer
question
Which of the following is used to make calls or send text messages from the targeted device?
answer
Bluebugging
Unlock the answer
question
Which of the following is used to uniquely identify a network, thereby ensuring that clients can locate the correct wireless local area network (WLAN) that they should be attaching to?
answer
Service set identifier (SSID)
Unlock the answer
question
Which of the following technologies emerged for the first time in 1998 and was designed to be a short-range networking technology that could connect different devices together?
answer
Bluetooth
Unlock the answer
question
Which of the following was NOT a benefit of the 802.11a over 802.11b?
answer
Lower cost of equipment
Unlock the answer
question
Which one of the following is the strongest authentication technology for protecting wireless networks?
answer
Wi-Fi Protected Access version 2 (WPA2)
Unlock the answer
question
A device that prevents entry into designated areas by motor vehicle traffic is called a:
answer
bollard.
Unlock the answer
question
A measurement of the percentage of individuals who have gained access but should not have been granted such is called:
answer
false acceptance rate (FAR).
Unlock the answer
question
A mechanical or electronic device designed to secure, hold, or close items operated by a key, combination, or keycard is a:
answer
lock.
Unlock the answer
question
When considering closed circuit TV as a security measure, the focal length must be considered. What is focal length?
answer
The camera's effectiveness in viewing objects from a horizontal and vertical view
Unlock the answer
question
Which of the following allows the placing of telephone calls over computer networks and the Internet?
answer
Voice over IP (VoIP)
Unlock the answer
question
Which of the following is a disadvantage of alarms?
answer
False alarms tied to the police may result in fines.
Unlock the answer
question
Which of the following is a type of smash-and-grab burglary in which a heavy vehicle is driven through the windows or doors of a closed shop, usually one selling electronics or jewelry, to quickly rob it?
answer
Ram-raiding
Unlock the answer
question
Which of the following lock types are smart and programmable?
answer
Cipher
Unlock the answer
question
Which of the following types of lighting is randomly turned on to create an impression of activity?
answer
Standby
Unlock the answer
question
Which type of token does NOT require that the card be inserted or slid through a reader?
answer
Contactless
Unlock the answer
question
Information or physical remnants collected from a crime scene and used to determine the extent of a crime and potentially prove a case in court is called:
answer
fault tolerance.
Unlock the answer
question
The capacity of a system to keep functioning in the face of hardware or software failure is called:
answer
fault tolerance.
Unlock the answer
question
The phase of incident response that involves determining which evidence is relevant to the investigation and which is not is called:
answer
analysis and tracking.
Unlock the answer
question
The process of tracking and carefully processing evidence from collection to trial to the return to its owner is called:
answer
creating a paper trail.
Unlock the answer
question
Which of the following defines how the organization will maintain what is accepted as normal day-to-day business in the event of a security incident or other events disruptive to the business?
answer
Business continuity plan
Unlock the answer
question
Which of the following documents states how personnel and assets will be safeguarded in the event of a disaster?
answer
Debriefing and feedback
Unlock the answer
question
Which of the following is NOT a commonly accepted rule of evidence?
answer
Rumored
Unlock the answer
question
Which of the following phases has the goal of determining what was done right, what was done wrong, and how to improve?
answer
Debriefing and feedback
Unlock the answer
question
Which of the following tests of a disaster recovery plan involves practicing backup and restore operations, incident response, communication and coordination of efforts, and alternative site usage in such a way that normal business operations are not adversely affected?
answer
Simulation
Unlock the answer
question
Which of the following types of evidence is received as the result of testimony or interview of an individual regarding something he or she directly experienced?
answer
Direct
Unlock the answer
question
A group of computers or a network configured to attract attackers is called a(n):
answer
honeynet.
Unlock the answer
question
Any activity that should not be but is occurring on an information system is called:
answer
an intrusion.
Unlock the answer
question
The primary components of a host-based intrusion detection system (HIDS) are:
answer
the command console and the monitoring agent software.
Unlock the answer
question
The principle that individuals will be given only the level of access that is appropriate for their specific job role or function is called:
answer
least privilege.
Unlock the answer
question
Which of the following controls fit in the area of policy and procedure?
answer
Administrative
Unlock the answer
question
Which of the following is a firewall best able to control?
answer
Traffic
Unlock the answer
question
Which of the following is commonly known as misuse detection because it attempts to detect activities that may be indicative of misuse or intrusions?
answer
Signature recognition
Unlock the answer
question
Which of the following options for firewall implementation has a region of the network or zone that is sandwiched between two firewalls?
answer
Demilitarized zone (DMZ)
Unlock the answer
question
Which of the following provides the ability to monitor a network, host, or application, and report back when suspicious activity is detected?
answer
Intrusion detection system (IDS)
Unlock the answer
question
Which of the following statements is NOT true about firewall policy?
answer
A policy is not necessary if the firewall is configured in the way the administrator wants.
Unlock the answer