Filters
Question type

Study Flashcards

Hacking into phone systems is called ___________.


A) Telnetting
B) Dial hacking
C) Phreaking
D) None of the above

Correct Answer

verifed

verified

Black hat hackers are also known as script kiddies.

Correct Answer

verifed

verified

The net command can be included in a ________ that will create a domain admin account.


A) Port
B) Scan
C) Script
D) None of the above

Correct Answer

verifed

verified

___________ is the process to find out what is on a target system.


A) Enumeration
B) Phishing
C) Mapping
D) Scanning

Correct Answer

verifed

verified

Checking an organization's websites is a form of active scanning.

Correct Answer

verifed

verified

Passing structured query language commands to a web application and getting the website to execute it is called SQL script _________.


A) Injection
B) Processing
C) Attacking
D) Execution

Correct Answer

verifed

verified

When an attacker injects client-side scripts into web pages viewed by other users so that those users interact with it,it is an example of _________.


A) Cross-site scripting
B) Phreaking
C) Phishing
D) None of the above

Correct Answer

verifed

verified

With a(n) _________ scan,if the port is closed,the response is an RST.If the port is open,the response is a SYN/ACK.


A) FIN
B) XMAS
C) SYN
D) ACK

Correct Answer

verifed

verified

ACK scans and NULL scans work only on UNIX systems.

Correct Answer

verifed

verified

True

Testing an organization's security is known as ________ testing.


A) Penetration
B) Location
C) Virus
D) None of the above

Correct Answer

verifed

verified

Hacking into phone systems is also known as phreaking.

Correct Answer

verifed

verified

Nmap enables you to set ________ such as -sP,-sS,and -oA.


A) Parameters
B) Flags
C) Switches
D) None of the above

Correct Answer

verifed

verified

There are 1,024 well-known ________ that are usually associated with specific services.


A) Ports
B) Processes
C) Applications
D) Programs

Correct Answer

verifed

verified

Scanning bulletin boards,making phony phone calls,and visiting websites by a hacker are examples of _________.


A) Active scanning
B) Passive scanning
C) Phreaking
D) Scouring

Correct Answer

verifed

verified

B

NetBIOS is an example of a port scanner.

Correct Answer

verifed

verified

The most popular port scanner in the hacking and security community is ________.


A) Portscan
B) Nmap
C) Servport
D) NetBIOS

Correct Answer

verifed

verified

Sid2User,UserInfo,and UserDump are examples of password cracking tools.

Correct Answer

verifed

verified

A SQL statement may begin with the word SELECT.

Correct Answer

verifed

verified

Ping scanning may be stopped by blocking ICMP packets.

Correct Answer

verifed

verified

_________ is a popular tool for cracking Windows passwords.


A) Sid2User
B) Cheops
C) Netcat
D) OphCrack

Correct Answer

verifed

verified

D

Showing 1 - 20 of 25

Related Exams

Show Answer