Exam 6: Techniques Used by Hackers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

ACK scans and NULL scans work only on UNIX systems.

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

True

Scanning bulletin boards,making phony phone calls,and visiting websites by a hacker are examples of _________.

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

B

_________ is a popular tool for cracking Windows passwords.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

D

Nmap enables you to set ________ such as -sP,-sS,and -oA.

(Multiple Choice)
4.7/5
(37)

When an attacker injects client-side scripts into web pages viewed by other users so that those users interact with it,it is an example of _________.

(Multiple Choice)
5.0/5
(30)

Black hat hackers are also known as script kiddies.

(True/False)
4.7/5
(44)

NetBIOS is an example of a port scanner.

(True/False)
4.8/5
(28)

With a(n)_________ scan,if the port is closed,the response is an RST.If the port is open,the response is a SYN/ACK.

(Multiple Choice)
4.8/5
(38)

A SQL statement may begin with the word SELECT.

(True/False)
4.9/5
(46)

Checking an organization's websites is a form of active scanning.

(True/False)
4.7/5
(29)

Testing an organization's security is known as ________ testing.

(Multiple Choice)
4.8/5
(34)

The most popular port scanner in the hacking and security community is ________.

(Multiple Choice)
4.8/5
(33)

___________ is the process to find out what is on a target system.

(Multiple Choice)
4.9/5
(39)

There are 1,024 well-known ________ that are usually associated with specific services.

(Multiple Choice)
4.8/5
(31)

Hacking into phone systems is also known as phreaking.

(True/False)
4.8/5
(27)

The net command can be included in a ________ that will create a domain admin account.

(Multiple Choice)
4.8/5
(36)

Hacking into phone systems is called ___________.

(Multiple Choice)
4.9/5
(33)

Passing structured query language commands to a web application and getting the website to execute it is called SQL script _________.

(Multiple Choice)
4.9/5
(35)

Sid2User,UserInfo,and UserDump are examples of password cracking tools.

(True/False)
4.9/5
(37)

Ping scanning may be stopped by blocking ICMP packets.

(True/False)
4.7/5
(33)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)