Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CEH Exam v9

Certified Ethical Hacker v9 exam

QuestionAnswer
how to launch the executable bad.exe within NoProblems.txt start noproblems.txt:bad.exe
OSI-approved open source for daily system scans Python
Blackjacking tool BBProxy
Fraggle uses this protocol UDP
SMURF uses this protocol ICMP
nc -L 56 -t -e cmd.exe spans command shell on port 8080 using NETCAT
NIST 800-53 US Gov security and privacy controls
Wrapping attacks involve messing with SOAP messages and replays them
Used to analyze and examine links between personnel or hardware using graphs and link analysis Maltego
Provides visibility and security controls for servers in a cloud CloudPassage Halo
Wireless symmetric encryption WEP
interactive and process controls OSSTMM
OSSTMM Open Source Security Testing Methodology Manual
./snort -b -A fast -c snort.conf SNORT in IDS mode
Send specially created environment variables and trailing commands - what attack? SHELLSHOCK
a Perl module supporting IDS evasion libwhisker
provides specific services to untrusted networks or hosts Bastion host
unsolicited messages to the target using Bluetooth bluejacking
IETF specs for securing DNS records DNSSEC
which layer is STP spanning tree protocol layer 2
phishing mitigation netcraft and phishtank toolbar
obfuscate source of network connection proxy firewall
protects against MITM attacks in WPA MIC (Message integrity Check)
CCMP WPA2
what is vulnerable to Chosen cipher-text attack RSA
protect internal intranet from enumeration for public-facing web server. remove A records for internal hosts
tool for firewall evasion tcp-over-dns
ping -l sets size of packet
separate data ownership from data custodian duties cloud computing
ICMP type 3 code 13 Administratively prohibited
SOAP uses XML
encrypts the entire packet ESP in tunnel mode
Linux cmd someproc & run as background task, will stop when user logs off (needs nohup)
HttpOnly flag XSS mitigation
; used in what type of attack CSPP (connection string parameter pollution)
uses AES for encryption algorithm WPA2
DNS zone transfer port and protocol 53 TCP
DNS lookup port and protocol 53 UDP
TCP flag, buffer full, force transmission PSH
Integrity for WPA2 CCMP - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
VoIP packet decoding tool Cain and Abel
Copies websites for download Black widow
chmod 744 user, group, other (rwx,r--,r--)
RID of 500 Administrator account
IPSec VPN scanning tool IKE-scan
Linux password directory /etc
can be used to encrypt hard drives PGP (not S/MIME)
Windows wireless tool Netstumbler
XMAS scan you get RST/ACK, what does it mean Port is closed
migrate actual OS to virtual machine Hypervisor-level rootkit
superoneclick Android root tool
Common Criteria rating EAL - evaluation assurance level
type of product being tested Protection profile (PP)
Target for CC Target of Evaluation (TOE)
describes the TOE and any requirements ST (Security Target)
Bluetooth 2.0 with EDR PSK modulation two types
A block cipher that uses a 56-bit key (with 8 bits reserved for parity). Because of the small key size, this encryption standard became quickly outdated and is not considered a very secure encryption algorithm. DES
A block cipher that uses a 168-bit key. 3DES (called triple DES) can use up to three keys in a multiple-encryption method. It’s much more effective than DES but is much slower. 3DES
A block cipher that uses a key length of 128, 192, or 256 bits, and effectively replaces DES. It’s much faster than DES or 3DES. AES
A block cipher that uses a 128-bit key and was also designed to replace DES. Originally used in Pretty Good Privacy (PGP) 2.0, IDEA was patented and used mainly in Europe. IDEA
A block cipher that uses a key size up to 256 bits. twofish
A fast block cipher, largely replaced by AES, using a 64-bit block size and a key from 32 to 448 bits. Blowfish is considered public domain. Blowfish
Encompasses several versions from RC2 through RC6. A block cipher that uses a variable key length up to 2040 bits. RC6, the latest version, uses 128-bit blocks and 4-bit working registers, whereas RC5 uses variab RC (Rivest Cipher)
4 phases of successful social engineering 1. Research (dumpster dive, visit websites, tour the company, and so on). 2. Select the victim (identify frustrated employee or other promising targets). 3. Develop a relationship. 4. Exploit the relationship (collect sensitive information).
voice phishing vishing
People Search Tools Intelius www.intelius.com • Zaba Search www.zabasearch.com • PeekYou www.peekyou.com • ZoomInfo AnyWho www.anywho.com • 411 www.411.com • People Search Now www.peoplesearchnow.com • Veromi www.veromi.net
Competitive Intelligence MarketWatch www.marketwatch.com • SEC Info www.secinfo.com • Euromonitor www.euromonitor.com • Wall Street Transcript www.twst.com • Lipper www.lippermarketplace.com • Experian www.experian.com • The Search Monitor www.thesearchmonitor.com
Tracking Online Reputation BrandsEye www.brandseye.com • Alexa www.alexa.com • Social Mention www.socialmention.com • ReputationDefender www.reputation.com • Rankur
RSA is vulnerable to Chosen-cipher-Text attack
Circuit level firewall operates at which level of OSI 5
Blooover is designed to do a bluebugging attack, access phone commands without user knowledge.
IDLE scan IPID is incrementing randomly target is not an IDLE zombie
how to prevent privilege escalation vulnerabilities ensure services run with least privilege
enables unicode chracters to be displayed in ASCII lenght of 1 to 4 bytes UTF-8
command-line sniffer and packet analyzer tcpdump (similar to wireshark)
bluetooth DOS attack Bluesmacking
unsolicited phone messages bluejacking
malware for android phones affecting two-factor auth. Zitmo
U P F Seq flags XMAS scan indicator
access to both plain text and cipher text known-plain-text attack
sniffs wifi for usernames and passwords Airsnarf
takes advantage of fragmenting bug in older windows devices Teardrop
aborts connection immediately in TCP RST
OSSTMM process controls nonrepudiation, confidentiality, Privacy
Automated pen testing Core Impact, CANVAS
an API that allows different components to communicate SOA (service Orient Arch)
makes use of broadcast pings SMURF attack
SNORT default rules Pass, Drop, Alert, Log
what layer for Circuit level firewall 5
types of social engineering attacks Human, computer, mobile
sniffers operate at what layers 2 and 3
where is SAM stored on a Windows machine c:\windows\system32\config
where to find well-known services defined by IANA C:\Windows\System32\drivers \etc\services
who maintains webgoat OWASP
theft of information from a wireless device through a Bluetooth connection. Bluesnarfing
is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones Bluejacking
Collecting profile information with bluetooth Blueprinting
DOS attack for bluetooth devices Bluesmacking
bluetooth wardriving Bluesniffing
Created by: conwaykc