Deck 6: Techniques Used by Hackers

Full screen (f)
exit full mode
Question
Testing an organization's security is known as ________ testing.

A)Penetration
B)Location
C)Virus
D)None of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
Hacking into phone systems is also known as phreaking.
Question
Black hat hackers are also known as script kiddies.
Question
Windows passwords are stored in a hash file in one of the system diretories.
Question
Checking an organization's websites is a form of active scanning.
Question
Nmap enables you to set ________ such as -sP,-sS,and -oA.

A)Parameters
B)Flags
C)Switches
D)None of the above
Question
The most reliable Nmap scan is ____________ scan.

A)ping
B)Connect
C)SYN
D)FIN
Question
NetBIOS is an example of a port scanner.
Question
Hacking into phone systems is called ___________.

A)Telnetting
B)Dial hacking
C)Phreaking
D)None of the above
Question
Some who performs a cyberattack without actually understanding it is a _______.

A)Gray hat hacker
B)White hat hacker
C)Script kiddie
D)None of the above
Question
ACK scans and NULL scans work only on UNIX systems.
Question
The most popular port scanner in the hacking and security community is ________.

A)Portscan
B)Nmap
C)Servport
D)NetBIOS
Question
Ping scanning may be stopped by blocking ICMP packets.
Question
Sid2User,UserInfo,and UserDump are examples of password cracking tools.
Question
___________ is the process to find out what is on a target system.

A)Enumeration
B)Phishing
C)Mapping
D)Scanning
Question
NMAP is a popular hacking tool.
Question
With a(n)_________ scan,if the port is closed,the response is an RST.If the port is open,the response is a SYN/ACK.

A)FIN
B)XMAS
C)SYN
D)ACK
Question
There are 1,024 well-known ________ that are usually associated with specific services.

A)Ports
B)Processes
C)Applications
D)Programs
Question
A SQL statement may begin with the word SELECT.
Question
Scanning bulletin boards,making phony phone calls,and visiting websites by a hacker are examples of _________.

A)Active scanning
B)Passive scanning
C)Phreaking
D)Scouring
Question
To create a domain admin account,the user must be a member of the __________ group.

A)Domain admins
B)Domain users
C)Backup operators
D)Everyone
Question
_________ is a popular tool for cracking Windows passwords.

A)Sid2User
B)Cheops
C)Netcat
D)OphCrack
Question
The net command can be included in a ________ that will create a domain admin account.

A)Port
B)Scan
C)Script
D)None of the above
Question
Passing structured query language commands to a web application and getting the website to execute it is called SQL script _________.

A)Injection
B)Processing
C)Attacking
D)Execution
Question
When an attacker injects client-side scripts into web pages viewed by other users so that those users interact with it,it is an example of _________.

A)Cross-site scripting
B)Phreaking
C)Phishing
D)None of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Techniques Used by Hackers
1
Testing an organization's security is known as ________ testing.

A)Penetration
B)Location
C)Virus
D)None of the above
A
2
Hacking into phone systems is also known as phreaking.
True
3
Black hat hackers are also known as script kiddies.
False
4
Windows passwords are stored in a hash file in one of the system diretories.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Checking an organization's websites is a form of active scanning.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Nmap enables you to set ________ such as -sP,-sS,and -oA.

A)Parameters
B)Flags
C)Switches
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
The most reliable Nmap scan is ____________ scan.

A)ping
B)Connect
C)SYN
D)FIN
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
NetBIOS is an example of a port scanner.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Hacking into phone systems is called ___________.

A)Telnetting
B)Dial hacking
C)Phreaking
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Some who performs a cyberattack without actually understanding it is a _______.

A)Gray hat hacker
B)White hat hacker
C)Script kiddie
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
ACK scans and NULL scans work only on UNIX systems.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
The most popular port scanner in the hacking and security community is ________.

A)Portscan
B)Nmap
C)Servport
D)NetBIOS
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Ping scanning may be stopped by blocking ICMP packets.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Sid2User,UserInfo,and UserDump are examples of password cracking tools.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
___________ is the process to find out what is on a target system.

A)Enumeration
B)Phishing
C)Mapping
D)Scanning
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
NMAP is a popular hacking tool.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
With a(n)_________ scan,if the port is closed,the response is an RST.If the port is open,the response is a SYN/ACK.

A)FIN
B)XMAS
C)SYN
D)ACK
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
There are 1,024 well-known ________ that are usually associated with specific services.

A)Ports
B)Processes
C)Applications
D)Programs
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
A SQL statement may begin with the word SELECT.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Scanning bulletin boards,making phony phone calls,and visiting websites by a hacker are examples of _________.

A)Active scanning
B)Passive scanning
C)Phreaking
D)Scouring
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
To create a domain admin account,the user must be a member of the __________ group.

A)Domain admins
B)Domain users
C)Backup operators
D)Everyone
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
_________ is a popular tool for cracking Windows passwords.

A)Sid2User
B)Cheops
C)Netcat
D)OphCrack
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
The net command can be included in a ________ that will create a domain admin account.

A)Port
B)Scan
C)Script
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Passing structured query language commands to a web application and getting the website to execute it is called SQL script _________.

A)Injection
B)Processing
C)Attacking
D)Execution
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
When an attacker injects client-side scripts into web pages viewed by other users so that those users interact with it,it is an example of _________.

A)Cross-site scripting
B)Phreaking
C)Phishing
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.