Exam 9: Network Vulnerability Assessment
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
What are "race conditions"?
Free
(Essay)
4.8/5
(26)
Correct Answer:
"Race conditions" refers to situations in which two threads, processes, or applications are able to modify a resource (and therefore interfere with each other) and the programmer has not taken precautions to ensure that the desired sequence of events is completed in the proper order. From a security standpoint, an attacker is looking to exploit the condition whereby a legitimate thread or process is consumed passing a code check and the malicious code slips by unnoticed.
Match each item with a statement below.
a.Sam Spade
f.NetStumbler
b.Wget
g.AirSnare
c.Nmap "Idle scanning" option
h.Aircrack-ng
d.Firewalk
i.Wireshark
e.XProbe2
-Designed to crack WEP and WPA-PSK keys to allow packet sniffing and wireless network auditing.
Free
(Short Answer)
4.9/5
(36)
Correct Answer:
H
Probably the most popular port scanner is ____, which runs on both UNIX and Windows systems.
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
A
Because it accepts firewall and intrusion logs from many sources, ____ is often one of the first organizations to spot network anomalies, and it often traces them to specific malware or vulnerability exploits.
(Multiple Choice)
4.9/5
(28)
Allowing users to decide which mobile code to run is the best way to resolve weaknesses introduced with mobile code.
(True/False)
4.8/5
(45)
A(n) ____________________ vulnerability scanner initiates traffic on the network in order to identify security holes.
(Short Answer)
4.9/5
(24)
A(n) ____ uses all the techniques and tools available to an attacker in an attempt to compromise or penetrate an organization's defenses.
(Multiple Choice)
4.9/5
(37)
Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended SQL input that can be passed to a database?
(Multiple Choice)
4.9/5
(32)
____ is a vulnerability scoring system designed to provide an open and standardized method for rating IT vulnerabilities.
(Multiple Choice)
4.9/5
(29)
Match each item with a statement below.
a.Sam Spade
f.NetStumbler
b.Wget
g.AirSnare
c.Nmap "Idle scanning" option
h.Aircrack-ng
d.Firewalk
i.Wireshark
e.XProbe2
-When run with the -sI switch, it allows you to bounce your scan across a firewall by using one of the idle DMZ hosts as the initiator of the scan.
(Short Answer)
4.7/5
(33)
If Web software can access parts of the underlying operating system's file system through normal URL mappings, a(n) ____ may occur.
(Multiple Choice)
4.9/5
(36)
The process of exploring the Internet presence of a target is sometimes called ____________________.
(Short Answer)
4.9/5
(31)
One of the preparatory parts of the attack methodology is the collection of publicly available information about a potential target, a process known as ____.
(Multiple Choice)
4.7/5
(33)
Match each item with a statement below.
a.Sam Spade
f.NetStumbler
b.Wget
g.AirSnare
c.Nmap "Idle scanning" option
h.Aircrack-ng
d.Firewalk
i.Wireshark
e.XProbe2
-An enhanced Web scanner that, among other things, scans an entire Web site for valuable pieces of information, such as server names and e-mail addresses.
(Short Answer)
4.8/5
(34)
Passive scanners are advantageous in that they do not require vulnerability analysts to get prior approval for testing.
(True/False)
4.8/5
(28)
Match each item with a statement below.
a.Sam Spade
f.NetStumbler
b.Wget
g.AirSnare
c.Nmap "Idle scanning" option
h.Aircrack-ng
d.Firewalk
i.Wireshark
e.XProbe2
-A UNIX or Linux systems support tool that allows a remote individual to "mirror" entire Web sites.
(Short Answer)
4.8/5
(37)
Match each item with a statement below.
a.Sam Spade
f.NetStumbler
b.Wget
g.AirSnare
c.Nmap "Idle scanning" option
h.Aircrack-ng
d.Firewalk
i.Wireshark
e.XProbe2
-Uses ICMP to determine the remote OS.
(Short Answer)
4.8/5
(24)
The ____ stage of the attack methodology is a systematic survey of the target organization's Internet addresses, conducted to identify the network services offered by the hosts in that range.
(Multiple Choice)
4.9/5
(34)
A(n) ____________________ is a network channel or connection point in a data communications system.
(Short Answer)
4.8/5
(31)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)