Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ITN 261 Study Guide

Midterm Study Guide for ITN 261

QuestionAnswer
ITN 261 Midterm Study Guide-
Chapter 1:
Question 1
10 / 10 pts
Which of the following are people who do bad things, generally actions that are against the law.?
White-hat hackers
Gray-hat hackers
Correct!
Black-hat hackers
Red-hat hackers
Question 2
10 / 10 pts
Attacking a company's Web applications to prevent them from being vulnerable is an example of which of the following?
Correct!
Ethical hacking if you have permission
A legal activity if the application is one you use
Black-hat hacking
Ethical hacking if you disclose the vulnerabilities
Question 3
10 / 10 pts
Which of the following are people who always do their work for good?
Correct!
White-hat hackers
Hacktivists
Social engineers
Phreaks
Question 4
60 / 70 pts
Match the following terminology to it's corresponding definition.
Correct!
Reconnaissance
Correct!
Footprinting
Correct!
Scanning
You Answered
Enumeration
Correct Answer
you will want to identify services running on any available host.
Correct!
Gaining access
Correct!
Maintaining access
Correct!
Covering tracks
Quiz Score: 90 out of 100
Chapter 2:
Question 1
10 / 10 pts
Which of the following activities is the responsibility of the OSI reference model transport layer?
Physical layer connectivity
Delivery of IP packets
Formatting the data
Physical framing
Question 2
10 / 10 pts
OSPF operates at which of the following layers of the OSI model?
Session
Application
Trasnport
Network
Question 3
10 / 10 pts
Which of the following is a factor that makes scanning UDP more difficult?
Low overhead
Lack of startup and shutdown
Speed
Packet structure
Question 4
10 / 10 pts
Which of the following is the main purpose of ICMP?
Packet delivery
Error detection and correction
Logical errors and diagnostics
IP packet delivery
Question 5
10 / 10 pts
Which of the following statements is true in regard to protocols?
IP is a routing protocol, whereas RIP is a routable protocol.
OSPF is a routing protocol, whereas IP is a routable protocol.
BGP is used as a routable protocol, whereas RIP is a routing protocol.
OSPF is a routing protocol, BGP is used as a routable protocol
Question 6
10 / 10 pts
The characteristics of Ethernet include all but which one of the following?
Collision detection
Sends traffic to all nodes on a hub
CSMA/CD
Sends traffic using a token
Question 7
10 / 10 pts
All but which one of the following is security vulnerability found in RIP?
Broadcasts all data
No authentication
Travels only 56 hops
Subject to route poisoning
Question 8
10 / 10 pts
Which of the following statements is true in regard to TCP?
It makes no effort at delivering information.
It guarantees delivery of information.
It does not establish session connection.
It is considered an OSI Layer 2 protocol.
Question 9
10 / 10 pts
Which of the following is the address range for Class B IP addresses?
127-191
192-223
224-239
240-255
Question 10
10 / 10 pts
Which of the following is a common application layer attack?
Port scanning
Malware
Session hijack
SYN attack
Quiz Score: 100 out of 100
Chapter 3:
Question 1
10 / 10 pts
Which of the following best describes the first two steps of the footprinting process?
Passive information gathering
Active information gathering
Actively mapping an organization's vulnerabilities
Using vulnerability scanners to map an organization
Question 2
10 / 10 pts
Which of the following examples best portrays passive information gathering?
Reviewing job listings posted by the targeted company
Port scanning the targeted company
Calling the company and asking questions about its services
Driving around the targeted company connecting to open wireless connections
Question 3
10 / 10 pts
Web resources used to footprint a company include all but which one of the following?
Internet archive
SEC EDGAR
Company Web site
Request for Comments (RFC) archive
Question 4
10 / 10 pts
Which of the following databases would be valuable for obtaining information about a company's financial history?
Internet Assigned Numbers Authority (IANA)
Wayback Machine
EDGAR
Whois
Question 5
10 / 10 pts
Which of the following best describes the purpose of the intitle command?
Instructs Google to search for a term within the title of a document
Instructs Google to ignore words in the title of a specific document
Instructs Google to look in the URL of a specific site
Instructs Google to search a specific URL
Question 6
10 / 10 pts
In order to locate domain information on a Canadian organization, which of the following Regional Internet Registries would be checked first?
LACNIC
APNIC
RIPE
ARIN
Question 7
10 / 10 pts
In order to locate domain information on a European organization, which of the following Regional Internet Registries would be checked first?
LACNIC
APNIC
RIPE
ARIN
Question 8
10 / 10 pts
Which of the following tools is used to determine the path to a specific IP address?
IANA
Nslookup
Whois
Traceroute
Question 9
10 / 10 pts
Which of the following files is edited to block a search engine's bots from indexing an organizational Web site?
lmhosts.txt
robots.txt
host.txt
index.txt
Question 10
10 / 10 pts
Which of the following is most likely to provide a wealth of publicly posted information about an organization's employees?
E-mail
Social networking sites
The organization's intranet
User group forums
Quiz Score: 100 out of 100
Chapter 5:
Question 1
10 / 10 pts
Nmap's -sT command tells the application to do which of the following?
Choose random targets
Pick a target
Treat all hosts as online
Perform a full TCP connection scan
Question 2
10 / 10 pts
What does OS fingerprinting allow?
OS vulnerability testing
Network mapping
Host OS identification
Packet capture
Question 3
10 / 10 pts
A ___________ scan detects packets in which all flags are active.
XMAS
FIN
ACK
SYN
Question 4
10 / 10 pts
Which of the following is a tool used for network mapping?
Superscan
Cheops
THC-SCan
Kismet
Question 5
10 / 10 pts
A SYN scan is useful for which of the following purposes?
Checking for FIN flags
Detecting open connections without completing the TCP handshake
Sending packets with no flags set
Sending packets with all flags set
Question 6
10 / 10 pts
Modems can be located by conducting what type of attack?
Wardialing
Wardriving
Pinging
Port scans
Question 7
10 / 10 pts
Which of the following ports does SSH operate on?
20
22
80
110
Question 8
10 / 10 pts
Which of the following best describes the SYN flag?
Synchronize sequence number **a - 144
Acknowledgement of sequence number
Final data flag used during the four-step shutdown
Reset bit used to close an abnormal connection
Question 9
10 / 10 pts
All of the following are active fingerprinting tools except:
Xprobe2
Nmap
Superscan
p0f
Question 10
10 / 10 pts
Which of the following is a tool used for wardriving?
Superscan
Cheops
THC-SCan
Kismet
Quiz Score: 100 out of 100
Chapter 6:
Question 1
10 / 10 pts
Through which of the following can port scans gain information about Windows IPC administrative share information?
Correct!
NULL sessions
Telnet
A Web browser
Social engineering
Question 2
0 / 10 pts
NetBIOS enumeration can allow ___________.
registry enumeration
trusted domain enumeration
user enumeration
Correct!
registry enumeration, trusted domain enumeration, and user enumeration
Question 3
10 / 10 pts
Which of the following is an attack that uses the rights of a low-privilege user to assume higher privileges?
Root attack
User emulation
Rights modification
Correct!
Privilege escalation
Question 4
10 / 10 pts
Installing Netcat on a remote system by using an exploit is an example of what type of attack?
Privilege escalation
Default software exploit
Correct!
Installing a back door
Rootkit installation
Question 5
10 / 10 pts
Enumeration can be used to discover all but which of the following types of information?
Correct!
Smartcard PINs
Ports
Services
Shares
Question 6
10 / 10 pts
Processes in Windows run in all of but which one of the following user contexts?
Local service
System
Current user
Correct!
Remote access
Question 7
10 / 10 pts
Which of the following is a database on the local system that stores user account information?
Correct!
Security Account Manager (SAM)
Local Security Account (LSA)
Kerberos
BitLocker
Question 8
0 / 10 pts
Which of the following best describes what occurs when a user attempts a connection to a Windows system without the standard username and password being provided?
Correct!
NULL session
Privilege escalation
Enumeration
Backdoor
Question 9
10 / 10 pts
Which of the following best describes what occurs when a lower-level account is cracked in order to obtain increased access?
NULL session
Correct!
Privilege escalation
Enumeration
Backdoor
Question 10
10 / 10 pts
Which of the following is a utility specifically designed to troubleshoot name resolution issues?
Ping
Correct!
Nbtstat
Tracert
Netstat
Quiz Score: 100 out of 100
Chapter 7:
Question 1
10 / 10 pts
What is it called when you obtain administrative privileges from a normal user account?
Correct!
Privilege escalation
Account migration
Privilege migration
Account escalation
Question 2
10 / 10 pts
What does John the Ripper’s single crack mode, the default mode, do?
Checks every possible password
Correct!
Uses known information and mangling rules
Uses a built-in wordlist
Uses wordlist and mangling rules
Question 3
10 / 10 pts
What is the trade-off for using rainbow tables?
Disk space prioritized over speed
Accuracy prioritized over disk space
Speed prioritized over accuracy
Correct!
Speed prioritized over disk space
Question 4
10 / 10 pts
What would an attacker use an alternate data stream on a Windows system for?
Correct!
Hiding files
Running programs
Storing PowerShell scripts
Blocking files
Question 5
10 / 10 pts
If you were looking for reliable exploits you could use against known vulnerabilities, what would you use?
Tor network
Meterpreter
msfvenom
Correct!
Exploit-DB
Question 6
10 / 10 pts
You’ve installed multiple files and processes on the compromised system. What should you also look at installing?
Registry keys
Alternate data streams
Correct!
Rootkit
Root login
Question 7
10 / 10 pts
What does pivoting on a compromised system get you?
Database access
Correct!
A route to extra networks
Higher level of privileges
Persistent access
Question 8
10 / 10 pts
What would you use the program rtgen for?
Generate wordlists
Correct!
Generating rainbow tables
Generating firewall rules
Persistent access
Question 9
10 / 10 pts
What tool would you use to compromise a system and then perform post-exploitation actions?
nmap
John the Ripper
searchsploit
Correct!
Metasploit
Question 10
10 / 10 pts
What application would be a common target for client-side exploits?
Web server
Correct!
Web browser
Web application firewall
Web pages
Quiz Score: 100 out of 100
Created by: user-1808614
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards