Events | Incidents | Hacking | Types of Attacks | Hacking Protection |
---|---|---|---|---|
Any observable occurrence in a system and/or network.
What is an event?
|
An adverse event in an information system and/or network.
What is an incident?
|
c. Code phreak.
13. Which of the following is not a category of hacker?
a. Gray-hat. b. White-hat. c. Code phreak. d. Script kiddie. |
b. SQL injection.
Which of the following is the most common computer attack?
a. Advances Persistent Threat. b. SQL injection. c. Man-In-The-Middle. d. Cross Site Scripting. |
b. The pentester has no knowledge of the network.
Which of the following is a characteristic of Black-box testing?
a. The pentester is familiarized with the network. b. The pentester has no knowledge of the network. c. The pentester is an employee of the network. d. The pentester may not use social engin |
b. A systems boot sequence continuously fails.
Which of the following is an event?
a. An organizations employee loses their laptop with sensitive company information on it. b. A systems boot sequence continuously fails. c. A hacker takes down the UC network for 1 hour. d. A high level employee has a r |
b. A companies CEO’s AD account is accessed by
Which of the following is an incident?
a. Packet flooding of a network. b. A companies CEO’s AD account is accessed by an unauthorized user. c. The CEO’s computer crashes several times in one day. d. A company’s network experiences unusually high traffic |
a. Guidelines.
Which of the following is not an administrative defense against hacking?
a. Guidelines. b. Policies. c. Compliance. d. Rules. |
Robert T. Morris.
The first worm ever was dispersed in 1988 by:
|
a. The pentester is familiarized with the network.
Which of the following is a characteristic of White-box testing?
a. The pentester is familiarized with the network. b. The pentester has no knowledge of the network. c. The pentester is an employee of the network. d. The pentester must use social engineer |
b. A systems boot sequence continuously fails.
Which of the following is an event?
a. An organizations employee loses their laptop with sensitive company information on it. b. A systems boot sequence continuously fails. c. A hacker takes down the UC network for 1 hour. d. A high level employee has a r |
d. Access Points.
Network perimeter identification of incidents occurs in all of the following except:
a. DMZ Systems. b. Firewalls. c. IDS/IPS. d. Access Points. |
d. Biometrics.
Which of the following is not a physical defense against hacking?
a. Cameras. b. Lighting. c. Guards. d. Biometrics. |
b. Network ranges.
Which of the following is a target of foot printing?
a. Possible exploits. b. Network ranges. c. Web-server user accounts. d. The CEO’s license plate number. |
a. Planning, Discovery, Attack, Reporting.
Penetration testing process:
a. Planning, Discovery, Attack, Reporting. b. Discovery, Planning, Attack, Reporting. c. Attack, Reporting, Discovery, Planning. d. Attack, Discovery, Planning, Reporting. |
a. Preparation, Detection, Containment, Eradication, Recovery, Follow-Up.
Which of the following is the correct plan for reaction to adverse events?
a. Preparation, Detection, Containment, Eradication, Recovery, Follow-Up. b. Detection, Eradication, Containment, Recovery, Follow-Up, Preparation. c. Preparation, Detection, Eradi |
d. Operating system log.
Host identification of incidents occurs in all of the following except
a. Anti-Virus software. b. Local firewalls. c. User noticing “strange activity”. d. Operating system log. |
a. Not-Mine-Don’t-Care.
Which of the following is not a hacker fallacy?
a. Not-Mine-Don’t-Care. b. No-Harm-Done. c. Computer-Game. d. Candy-From-A-Baby. |
d. War dialing.
Of the following which is a technique of using a modem to scan a list of telephone numbers, dialing every number in an area code to search for computers, Bulletin board systems, and fax machines?
a. Algorithm automation. b. Algorithm kitting. c. War drivi |
a. Full network DMZ.
Which of the following is not a port scanning countermeasure?
a. Full network DMZ. b. White Listing. c. Security Awareness Training. d. Port Scanning. |
1. Information
2. Warning 3. Error 4. Success Audit (Security log) 5. Failure Audit (Security log)
What are some types of events that are logged into a computer? (Name 4)
|
c. Containment.
To further investigate an incident a system back-up should be made during which phase?
a. Detection. b. Preparation. c. Containment. d. Recovery. |
d. Charity.
Which of the following is not a motivation to hack?
a. Hacktivism. b. Fun. c. Money. d. Charity. |
d. eBlaster
Of the following applications, which one is an example of a data-sending Trojan?
a. SubSixes b. Siera Spy Generator c. Fireeater 2000 d. eBlaster |
c. APT Attack.
Which of the following is not a penetration tester attack?
a. Insider Attack. b. Stolen Equipment Attack. c. APT Attack. d. Social Engineering Attack. |