Chapter 2 Test Questions True/False 1. Attackers follow a fixed methodology that could be divided in four steps. ANS: False. Attackers follow a fixed methodology that could be divided in six steps. 2. The Internet is a great source of information that attackers can use to do reconnaissance of the target. ANS: True 3. One of the techniques an attacker could use to cover his tracks is to delete or change the log files. ANS: True 4. Because reconnaissance is passive in nature, if it is done correctly the victim will never know it is occurring. ANS: True 5. Scanning and enumeration are the first step in the attacker’s methodology. ANS: False. Scanning and enumeration are the second step in the attacker’s methodology. 6. If the organization employs the Deny All rule, the hacker’s effectiveness could be reduced. ANS: True 7. An ethical hacker follows a similar process as the attacker and does not care if harm is done to the company network during the process. ANS: False. An ethical hacker follows a similar process as the attacker but strives to do no harm to the company network during the process. 8. The methodology used to secure an organization can be divided into five steps. ANS: True 9. The OSI model has four layers. ANS: False. The OSI model has seven layers. 10. Although there are many protocols in the TCP/IP stack, the following four are considered the core: IP, TCP/IP, UDP, and ICMP. ANS: True Multiple Choice 1. Dumpster diving, social engineering, and Internet searches are some of the activities that take place in the following step of the attacker’s methodology. a. Reconnaissance b. Scanning and enumeration c. Gaining access d. Escalation of privilege ANS: A 2. What is used to gather in-depth information about the target such as user accounts and open shares? a. Reconnaissance b. Scanning and enumeration c. Gaining access d. Escalation of privilege ANS: B 3. Accessing an open wireless connection or exploiting a vulnerability on a server is some of the activities that take place in the following step of the attacker’s methodology. a. Reconnaissance b. Scanning and enumeration c. Gaining access d. Escalation of privilege ANS: C 4. Which OSI layer is responsible for encryption and decryption of data? a. Application b. Presentation c. Session d. Network ANS: B 5. Which OSI layer is responsible for the logical addressing and routing of the packets? a. Application b. Presentation c. Session d. Network ANS: D 6. Which OSI layer is responsible for establishing the TCP connection and is vulnerable to session hijacking attacks? a. Application b. Presentation c. Session d. Network ANS: C 7. Which of the following is not one of the layers of the TCP/IP protocol stack? a. Application b. Host-to-host c. Transmission d. Internet ANS: C 8. Which of the following protocols is not part of the application layer? a. TCP b. HTTP c. FTP d. DNS ANS: A 9. What is a type of attack that exploits overlapping IP fragments and can affect older systems such as Windows 95, NT, and 3.1? a. Session hijack attack b. Teardrop attack c. Nimba worm attack d. DSN cache poisoning attack ANS: B 10. Spoofing and spamming are two of the vulnerabilities associated with which of the following protocol? a. HTTP b. FTP c. SMTP d. TFTP ANS: C 11. Which protocol is responsible for addressing and routing the data? a. TCP b. IP c. UDP d. ICMP ANS: B 12. Which protocol is used for diagnostics and provides error messages? a. TCP b. IP c. UDP d. ICMP ANS: D 13. Which of the following TCP/IP layers is responsible for the physical delivery of IP packets via frames? a. Network access Layer b. Internet layer c. Host-to-host layer d. Application layer ANS: A 14. Which of the following is not one of the flags used in the TCP three-step handshake? a. b. c. d. SYN PSH SYN ACK ACK ANS: B 15. Internet Protocol (IP) and Internet Control Message Protocol (ICMP) are part of what TCP/IP layer? a. Network access layer b. Internet layer c. Host-to-host layer d. Application layer ANS: B Matching: A. B. C. D. E. F. G. H. I. J. Set of tools used to help the attacker maintain access to the system Active step of attempting to connect to a system and get a response A system that could be used to detect an attack A protocol that operates on ports 20 and 21 and is the most commonly used by hacker services A TCP/IP layer responsible for end-to-end delivery A TCP/IP layer responsible for application support An application that operates on port 53 and resides at the application layer of the TCP/IP protocol stack A protocol responsible for resolving IP addresses to MAC addresses A protocol that is responsible for establishing a connection between two hosts by using a three-step handshake process A protocol that is best suited for quick delivery of nonsensitive data a. Rootkit b. Scanning c. Intrusion Detection System (IDS) d. e. f. g. h. i. j. FTP Host-to-Host Layer Application Layer DNS ARP TCP UDP