Deck 3: VoIP Penetration Testing
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
Play
Full screen (f)
Deck 3: VoIP Penetration Testing
1
In ____, an attacker sends a message that looks genuine, but in reality, the message is broken or fuzzed.
A) spoofing
B) denial-of-service attacks
C) protocol fuzzing
D) eavesdropping
A) spoofing
B) denial-of-service attacks
C) protocol fuzzing
D) eavesdropping
protocol fuzzing
2
In a(n) ____ attack, the attacker disturbs the flow of the message packets in order to make it impossible for the user or server to handle the call.
A) spoof
B) session anomalies
C) reconnaissance attack
D) eavesdropping
A) spoof
B) session anomalies
C) reconnaissance attack
D) eavesdropping
session anomalies
3
A TCP ____ scan involves sending a TCP SYN-flagged or ACK-flagged packet to a commonly used TCP port on the target host.
A) ping
B) ftp proxy
C) SYN
D) FIN
A) ping
B) ftp proxy
C) SYN
D) FIN
ping
4
____ is a port scanner that supports several different types of scans, including TCP SYN scanning and UDP scanning, in one utility.
A) UDP
B) Smap
C) SNMP
D) Nmap
A) UDP
B) Smap
C) SNMP
D) Nmap
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
____ is a method of connecting to a port on a remote target to determine further information about the associated services running on that specific port.
A) Banner grabbing
B) War driving
C) MAC flooding
D) Social engineering
A) Banner grabbing
B) War driving
C) MAC flooding
D) Social engineering
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
____ is an SIP scanning and fingerprinting tool that analyzes SIP message responses to find out the type of device it is probing.
A) Nmap
B) UDP
C) Smap
D) Sipsak
A) Nmap
B) UDP
C) Smap
D) Sipsak
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
____ is a command-line tool used for OPTIONS scanning, which is useful for stress testing and diagnosing SIP service issues.
A) Netdude
B) Sipsak
C) Oreka
D) VoIPong
A) Netdude
B) Sipsak
C) Oreka
D) VoIPong
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
TFTP servers usually use UDP port ____.
A) 10
B) 25
C) 42
D) 69
A) 10
B) 25
C) 42
D) 69
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
In many VoIP devices, SNMP is an insecure protocol listening on port ____.
A) 43
B) 69
C) 162
D) 200
A) 43
B) 69
C) 162
D) 200
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
____ was developed to attempt to determine the password for every user of SIP messages.
A) Netdude
B) AuthTool
C) Oreka
D) VoIPong
A) Netdude
B) AuthTool
C) Oreka
D) VoIPong
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck