Exam 4: Operating Systems and Applications
Exam 1: Ethical Hacking and Testing52 Questions
Exam 2: Information Gathering65 Questions
Exam 3: Malicious Code58 Questions
Exam 4: Operating Systems and Applications63 Questions
Exam 5: Networks and Services64 Questions
Select questions type
What is the best definition of a covert channel?
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
B
Onan wants to install a biometric reader to control access to a server room. He knows there will only be about 5 people that will ever need access. In regards to storage of the user account credentials, which of the following systems will be the easiest and most efficient to install?
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
B
One of the disadvantages of symmetric key encryption is key management. For instance, if there are 10 people that wish to exchange data with each other, but maintain confidentiality at the same time, how many keys must be issued?
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
D
An attacker sends email to a domain toward an invalid address intentionally. A bounce back is sent and the attacker uses the header to determine internal mail relays. How is a header read to determine the path the bounce took?
(Multiple Choice)
4.7/5
(41)
A common technique when compromising Linux hosts is to make sure that if it is used as a sniffer, the command __________ is replaced with a modified version that will not show the ________ flag in its
Output. (fill in the blanks)
(Multiple Choice)
4.8/5
(36)
The act of stealing information from a victims magnetic strip is called:
(Multiple Choice)
4.7/5
(27)
Which of the following is the static string that is encrypted with the DES key in LM?
(Multiple Choice)
4.8/5
(25)
In order to speed up the process of breaking a password that is pretty strong, Barney decides to use DNA.
What is the best description of this technique?
(Multiple Choice)
4.8/5
(43)
It is possible to run critical services on a Linux machine in such as way that the root directory for that service seems to be different than the root of the actually system. The purpose is to prevent access to any files outside of that directory structure. What is this technique called?
(Multiple Choice)
4.9/5
(50)
Bill seems to be connected to every marketing project that has had information leaked to the same competitor. Someone notices on a myspace page some photographs of Bill socializing with some executives of that competitor. Bill is sent on vacation for a week, and a supervisor access Bill's email and notices repeated emails with silly documents attached like jokes, random lists, or cooking recipe's.
He asks you if this seems suspicious and wonders if these are coded messages. You tell him it is even easier than that, and suspect which of the following techniques?
(Multiple Choice)
4.8/5
(36)
As a technique, rootkits hide processes and the resources that start them. What is the primary objective of a rootkit?
(Multiple Choice)
4.9/5
(51)
Which of the following is not a valid mobile phone technology?
(Multiple Choice)
4.8/5
(32)
Marco wants to encode data into a music file. Since it is text, he isn't sure this can be done. After searching the internet he comes across a promising tool.
What tool did he find?
(Multiple Choice)
4.8/5
(43)
Ernest finds a laptop that seems to have an encrypted drive. He knows the owner of the laptop works for a company that requires 15 character strong passwords. With a good quality password cracker how long will it take Ernest to brute force this password?
(Multiple Choice)
4.8/5
(36)
Some versions of Windows Servers use a feature called "syskey" to enhance the protection of the database where user account hashes are stored. What level of encryption does syskey use in Windows 2000?
(Multiple Choice)
4.8/5
(38)
Which of the following is the best description of a "weak key"?
(Multiple Choice)
4.8/5
(34)
Sara has managed to get access to the passwd file in the Linux system. Which of the following entries shows a user that is in the root permissions group?
Rkuby:x:1001:1001:Ron Kuby:/home/rkuby:/bin/bash dhcp:x:1002:1002::/home/dns:/bin/bash monticore:x:1003:0::/home/monticore:/bin/bash awright:x:1004:500:Amber Wright:/home/awright:/bin/bash
(Multiple Choice)
4.9/5
(34)
A mechanism that RFID devices use to be rendered inoperative is called:
(Multiple Choice)
4.9/5
(33)
An attacker writes a script similar to the one given. What is he trying to accomplish?
FOR /F "token=1, 2*" %i in passlist.txt do net use \\target\IPC$ %i /u: %j
(Multiple Choice)
4.7/5
(37)
Showing 1 - 20 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)