Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CEH by KGS

Certified Ethical Hacker study material

QuestionAnswer
ICMP is Protocol? Protocol 1
TCP is Protocol? Protocol 6
UDP is Protocol? Protocol 17
GRE is Protocol? Protocol 47
AH is Protocol? Protocol 50
ESP is Protocol? Protocol 51
FTP is Port? Port 20 - 21
SSH is Port? Port 22
Telnet is Port? Port 23
SMTP is Port? Port 25
WINS is Port? Port 42
DNS is Port? Port 53
HTTP is Port? Port 80 - 81 -8080
Kerberos is Port? Port 88
POP3 is Port? Port 110
Portmapper (Linux)is Port? Port 111
NNTP is Port? Port 119
RPC-DCOM is Port? Port 135
SMB is Port? Port 137 - 138 - 139
IMAP is Port? Port 143
SNMP is Port? Port 161 - 162
LDAP is Port? Port 389
CIFS is Port? Port 445
SOCKS5 is Port? Port 1080
RDP is Port? Port 3389
IRC is Port? Port 6667
Palm Pilot Remote Sync is Port? Port 14237
Trojan Horses Port 7777 Tini
Trojan Horses Port 12345 NetBus
Trojan Horses Port 27374 Back Orifice
Trojan Horses Port 31337 Sub7
Password Cracking by GUESSING is... Is the most efficient, assuming information gathering before hand
Password Cracking by DICTIONARY is... Based on the predetermined list of words
Password Cracking by BRUTE FORCE is... Trying every possible combination of characters
Password Cracking by HYBRID is... A combination of all other attacks
What is the name of the software tool used to crack a single account on Netware Servers using a dictionary attack? NWPCrack
How can you determine if an LM hash you extracted contains a password that is less than 8 characters long? The right most portion of the has is always the same
Several of your coworkers are having a discussion over the etc/passwd file. They are at odds over what types of encryption are used to secure Linux passwords. Linux passwords can be encrypted with ____, ____ and ____. MD5, DES and Blowfish
What are the two basic types of attacks? Passive and Active
True or False. Sniffing is considered a passive attack? False
When discussing passwords, what is considered a brute force attack? Attempting every single possibility until you exhaust all possible combinations or discover the password
What are two well known password cracsheets programs? L0phtcrack and John the Ripper
True or False. Password cracsheets programs reverse the hashing process to recover passwords? False
Name four regional Internet registries ARIN - American Registry of Internet Numbers RIPE NCC - Europe, the Middle East and part of Central Asia LACNIC - Latin American and Caribbean Internet Addresses Registry APNIC - Asia Pacific Network Information Centre
What is a tool for performing footprinting undetected? Whois will not trigger an IDS alert or otherwise be detected by an organization
What three tools are used for footprinting? Whois, Sam Spade, and NSlookup are all used to passively gather information about a target. NMAP and SuperScan are host and network scanning tools.
What is the next immediate step to be performed after footprinting? According to CEH methodology, scanning occurs after footprinting. Enumeration and system hacking are performed after footprinting. Bypassing an IDS would occur later in the hacking cycle.
What are good sources of information about a company or its employees? Newsgroups, job postings, company websites and press releases are all good sources for information gathering.
How does traceroute work? Traceroute uses the TTL values to determine how many hops the router is from the sender. Each router decrements the TTL by one under normal conditions.
What is footprinting? Footprinting is gathering information about a target organization. Footprinting is not scanning a target network or mapping the physical layout of a target network.
NSlookup can be used to gather information regarding what? NSlookup queries a DNS server for DNS records such as hostnames and IP addresses.
What is a type of social engineering? Shoulder surfing is considered a type of social engineering.
What is an example of social engineering? Calling helpdesk and convincing them to reset a password for a user account is an example of social engineering. Holding open a door and installing a keylogger are examples of physical access intrusions.
What is the best way to prevent a social engineering attack? Employee Training and Education is the best way to prevent a social engineering attack.
Created by: KarenSealock
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards