Exam 9: Network Vulnerability Assessment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The CVSS ____ Score is set by the organization using the software.

(Multiple Choice)
4.8/5
(26)

____ verify that an organization's security policies are prudent (cover the right issues) and are being implemented correctly.

(Multiple Choice)
4.8/5
(33)

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -A free, client-based network protocol analyzer.

(Short Answer)
4.8/5
(38)

Wired networks are just as vulnerable to sniffing as wireless networks.

(True/False)
4.8/5
(19)

____________________, also known as "fuzzing," is a straight-forward technique that looks for vulnerabilities in a program or protocol by feeding random input into the program or the network running the protocol.

(Short Answer)
4.8/5
(41)

The ____ command, available on most popular Web browsers, allows users to see the source code behind the page.

(Multiple Choice)
4.9/5
(31)

The most realistic type of penetration test is a ____ box test.

(Multiple Choice)
4.8/5
(42)

A(n) ____ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.

(Multiple Choice)
4.8/5
(24)

Organizations are safe from sniffer attacks when their computing environment is primarily a switched network environment.

(True/False)
4.8/5
(28)

The printf (user_input); command in C has the potential to cause a(n) ____ vulnerability.

(Multiple Choice)
4.8/5
(33)

Explain the two points administrators should remember if they are wary of using the same tools that attackers use.

(Essay)
4.8/5
(35)

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -Monitors the airwaves for any new devices or access points.

(Short Answer)
4.8/5
(33)

Why can the failure to validate how user input is handled result in a cross-site scripting attack?

(Essay)
4.8/5
(39)

Describe how the criticality of the affected assets must be taken into account when conducting a risk assessment for a vulnerability.

(Essay)
4.7/5
(35)

Protocol analyzers are commonly referred to as ____.

(Multiple Choice)
4.9/5
(38)

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -Uses incrementing Time-to-Live (TTL) packets to determine the path into a network as well as the default firewall policy.

(Short Answer)
4.9/5
(36)

Match each item with a statement below. a.Sam Spade f.NetStumbler b.Wget g.AirSnare c.Nmap "Idle scanning" option h.Aircrack-ng d.Firewalk i.Wireshark e.XProbe2 -A freeware tool that applies packet sniffing to wireless networks.

(Short Answer)
4.9/5
(43)

A ____ (sometimes called a network protocol analyzer) is a network tool that collects copies of packets from the network and analyzes them or stores the packets for later analysis.

(Multiple Choice)
4.9/5
(36)

Describe Google hacking and provide an example.

(Essay)
4.9/5
(37)

Implementing applications that verify the true communication destination during execution help prevent vulnerabilities associated with ____.

(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)