Chapter 2 Test Questions True/False Attackers follow a fixed

advertisement
Chapter 2 Test Questions
True/False
1. Attackers follow a fixed methodology that could be divided in four steps.
ANS: False. Attackers follow a fixed methodology that could be divided in six steps.
2. The Internet is a great source of information that attackers can use to do reconnaissance of the
target.
ANS: True
3. One of the techniques an attacker could use to cover his tracks is to delete or change the log
files.
ANS: True
4. Because reconnaissance is passive in nature, if it is done correctly the victim will never know it is
occurring.
ANS: True
5. Scanning and enumeration are the first step in the attacker’s methodology.
ANS: False. Scanning and enumeration are the second step in the attacker’s methodology.
6. If the organization employs the Deny All rule, the hacker’s effectiveness could be reduced.
ANS: True
7. An ethical hacker follows a similar process as the attacker and does not care if harm is done to
the company network during the process.
ANS: False. An ethical hacker follows a similar process as the attacker but strives to do no harm
to the company network during the process.
8. The methodology used to secure an organization can be divided into five steps.
ANS: True
9. The OSI model has four layers.
ANS: False. The OSI model has seven layers.
10. Although there are many protocols in the TCP/IP stack, the following four are considered the
core: IP, TCP/IP, UDP, and ICMP.
ANS: True
Multiple Choice
1. Dumpster diving, social engineering, and Internet searches are some of the activities that take
place in the following step of the attacker’s methodology.
a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege
ANS: A
2. What is used to gather in-depth information about the target such as user accounts and open
shares?
a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege
ANS: B
3. Accessing an open wireless connection or exploiting a vulnerability on a server is some of the
activities that take place in the following step of the attacker’s methodology.
a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege
ANS: C
4. Which OSI layer is responsible for encryption and decryption of data?
a. Application
b. Presentation
c. Session
d. Network
ANS: B
5. Which OSI layer is responsible for the logical addressing and routing of the packets?
a. Application
b. Presentation
c. Session
d. Network
ANS: D
6. Which OSI layer is responsible for establishing the TCP connection and is vulnerable to session
hijacking attacks?
a. Application
b. Presentation
c. Session
d. Network
ANS: C
7. Which of the following is not one of the layers of the TCP/IP protocol stack?
a. Application
b. Host-to-host
c. Transmission
d. Internet
ANS: C
8. Which of the following protocols is not part of the application layer?
a. TCP
b. HTTP
c. FTP
d. DNS
ANS: A
9. What is a type of attack that exploits overlapping IP fragments and can affect older systems such
as Windows 95, NT, and 3.1?
a. Session hijack attack
b. Teardrop attack
c. Nimba worm attack
d. DSN cache poisoning attack
ANS: B
10. Spoofing and spamming are two of the vulnerabilities associated with which of the following
protocol?
a. HTTP
b. FTP
c. SMTP
d. TFTP
ANS: C
11. Which protocol is responsible for addressing and routing the data?
a. TCP
b. IP
c. UDP
d. ICMP
ANS: B
12. Which protocol is used for diagnostics and provides error messages?
a. TCP
b. IP
c. UDP
d. ICMP
ANS: D
13. Which of the following TCP/IP layers is responsible for the physical delivery of IP packets via
frames?
a. Network access Layer
b. Internet layer
c. Host-to-host layer
d. Application layer
ANS: A
14. Which of the following is not one of the flags used in the TCP three-step handshake?
a.
b.
c.
d.
SYN
PSH
SYN ACK
ACK
ANS: B
15. Internet Protocol (IP) and Internet Control Message Protocol (ICMP) are part of what TCP/IP
layer?
a. Network access layer
b. Internet layer
c. Host-to-host layer
d. Application layer
ANS: B
Matching:
A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
Set of tools used to help the attacker maintain access to the system
Active step of attempting to connect to a system and get a response
A system that could be used to detect an attack
A protocol that operates on ports 20 and 21 and is the most commonly used by hacker
services
A TCP/IP layer responsible for end-to-end delivery
A TCP/IP layer responsible for application support
An application that operates on port 53 and resides at the application layer of the TCP/IP
protocol stack
A protocol responsible for resolving IP addresses to MAC addresses
A protocol that is responsible for establishing a connection between two hosts by using a
three-step handshake process
A protocol that is best suited for quick delivery of nonsensitive data
a. Rootkit
b. Scanning
c. Intrusion Detection System (IDS)
d.
e.
f.
g.
h.
i.
j.
FTP
Host-to-Host Layer
Application Layer
DNS
ARP
TCP
UDP
Download