CNIT 123

CNIT 123
Review
Chapter 1
Ethical Hacking
Overview
Sally wants to hack into the CCSF
medical center and get student
records, to prove how lousy the
security is. What should she do first?
A. Use Tor
B. Create a fake identity
C. Inform the college administration in writing
D. Get permission from the college
administration in writing
E. None of the above
Sally wants to hack into the CCSF
medical center and get student
records, to prove how lousy the
security is. What should she do first?
A. Use Tor
B. Create a fake identity
C. Inform the college administration in writing
D. Get permission from the college
administration in writing
E. None of the above
What law makes it a federal crime to
access classified information without
authorization?
A. CFAA
B. EPIC
C. PATRIOT ACT
D. Stored Wire and Electronic Communication
and Transactional Records Act
E. DMCA
Which of these acts is illegal?
A. Cracking WEP to use your neighbor's router
B. Using Nmap to scan google.com
C. Bypassing a logon password as part of a
computer repair job for a customer
D. Searching for passwords on Google
E. Reading secret documents on Wikileaks
Which act is not illegal?
A. Downloading pop music from The Pirate Bay
B. Connecting to your neighbor's unsecured
wireless network
C. Using a keylogger to get your teacher's final
exam
D. Using a booter to kick rival players off a video
game
E. Joining Anonymous and taking down Sony with
the Low Orbit Ion Cannon
Chapter 2
TCP/IP Concepts Review
Which TCP/IP layer uses MAC
addresses?
A. Application
B. Transport
C. Internet
D. Network
E. None of the above
Which protocol is encrypted?
A. HTTP
B. Telnet
C. FTP
D. SMTP
E. None of the above
I send a SYN to a server, and get a RST
back. What state is this port in?
A. Open
B. Closed
C. Filtered
D. The answer cannot be determined from the
information provided
I send an ACK to a server, and get no
reply. What state is this port in?
A. Open
B. Closed
C. Filtered
D. The answer cannot be determined from the
information provided
Which TCP header field determines
how frequently ACK packets are
required?
A. Destination port
B. SEQ
C. ACK
D. Data offset
E. Window
Which protocol is the most secure?
A. Telnet
B. FTP
C. SSH
D. HTTP
E. SMTP
Which protocol uses the GET method?
A. Ethernet
B. IP
C. TCP
D. UDP
E. HTTP
Which protocol uses SYN and ACK?
A. Ethernet
B. IP
C. TCP
D. UDP
E. HTTP
Which protocol uses MAC addresses?
A. Ethernet
B. IP
C. TCP
D. UDP
E. HTTP
How many bits are there in an IPv4
address?
A. 8
B. 32
C. 48
D. 128
E. 256
What port does Telnet use?
A. 20
B. 21
C. 23
D. 80
E. 443
What makes UDP different from TCP?
A. UDP has no handshake
B. UDP is unreliable
C. UDP transfers data faster
D. UDP has a smaller header
E. All of the above
Chapter 3
Network and Computer
Attacks
Which threat must be attached to an
EXE file?
A. Virus
B. Worm
C. Trojan
D. Keylogger
E. Rootkit
Which threat is caused by lying
security professionals?
A. Bot
B. FUD
C. DoS
D. DDoS
E. Buffer overflow
Which threat is caused by a careless
programmer?
A. Bot
B. Trojan
C. DoS
D. DDoS
E. Buffer overflow
Which attack uses hundreds or
thousands of machines at once?
A. Buffer overflow
B. DoS
C. Spoofing
D. Spam
E. DDoS
Which attack defeats physical security?
A. Virus
B. Session hijacking
C. Keylogger
D. Bump key
E. Worm
Chapter 4
Footprinting and Social
Engineering
Which item allows you to change
HTTP requests as they are sent?
A. Proxy
B. Footprinting
C. Whois
D. Cookie
E. Web bug
Which item finds the human who
owns a domain name?
A. HTTP status code
B. Footprinting
C. Whois
D. Cookie
E. Web bug
Which item finds a list of all the
computers at a company?
A. Extortion
B. Footprinting
C. Zone transfer
D. Cookie
E. Web bug
What is the most common way to
break into an email account?
A. Extortion
B. Footprinting
C. Piggybacking
D. Shoulder surfing
E. Phishing
Which tool queries a DNS server?
A. Proxy
B. Nmap
C. Cain
D. Whois
E. dig
Which item is a passive plaintext file?
A. Web bug
B. Cookie
C. Zone transfer
D. HTTP GET
E. Spam
Chapter 5
Port Scanning
Which type of scan became far less
effective after Windows XP SP2?
A. PING scan
B. SYN scan
C. ACK scan
D. UDP scan
E. NULL scan
Which type of scan is the most
common, and called a "Stealth scan"?
A. PING scan
B. SYN scan
C. ACK scan
D. UDP scan
E. NULL scan
Chapter 6
Enumeration
Which OS introduced Plug and Play?
A. Win 95
B. Win XP
C. Vista
D. Win 7
E. Win 8
Which OS used the FAT file system?
A. Win 95
B. Win XP
C. Vista
D. Win 7
E. Win 8
Which OS introduced ASLR?
A. Win 95
B. Win XP
C. Vista
D. Win 7
E. Win 8
Which OS uses null sessions?
A. Old Windows versions
B. All Windows versions
C. Unix
D. Netware
E. iOS
Chapter 7
Programming for
Security Professionals
Which is an object-oriented
language?
A. C
B. Assembly language
C. Machine language
D. C++
E. Perl
Which language is most likely to
cause buffer overflow errors?
A. C
B. Perl
C. Visual Basic
D. Python
E. Bash shell scripting
Chapter 8
Desktop and Server OS
Vulnerabilities
Which item is a Windows file-sharing
protocol?
A. FAT
B. NTFS
C. ADS
D. RPC
E. SMB
Which item has a Lockdown Wizard?
A. IIS
B. LDAP
C. Null sessions
D. SQL server
E. CIFS
Which item hides a file inside another
file?
A. ADS
B. LDAP
C. Null sessions
D. WinFS
E. NTFS
Chapter 9
Embedded Operating
Systems: The Hidden
Threat
Which item is based on Windows 7?
A. RTOS
B. Windows embedded standard
C. Windows CE
D. VxWorks
E. QNX
Which item is a Cisco product?
A. RTOS
B. Green hill
C. RTEMS
D. VxWorks
E. QNX
Which item is intended for use in
routers?
A. dd-wrt
B. RTLinux
C. Monolithic
D. Microkernel
E. RTEMS
Which item is a cryptographic chip?
A. Rootkit
B. TPM
C. LoJack
D. Stuxnet
E. AURORA
Chapter 1
Ethical Hacking
Overview
What is the most popular Web
server?
A. Apache
B. Nginx
C. IIS
D. Firefox
E. Chrome
What security flaw has caused the
most stolen data?
A. XSS
B. Injection
C. CSRF
D. Unsecured storage
E. Unsecured transmission
What security flaw allows one user to
impersonate another?
A. XSS
B. Injection
C. CSRF
D. Unsecured storage
E. Unsecured transmission
What is the best way to prevent SQL
injections?
A. WAF
B. Input validation
C. Output validation
D. Parameterized queries
E. OS updates
Chapter 11
Hacking Wireless
Network
Which method is the best way to
secure a wireless network?
A. Disabling SSID broadcasts
B. MAC address filtering
C. WEP
D. WPA
E. WPS
Which standard goes up to 54 Mbps
at 5 Ghz?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
E. 802.11ac
Which standard includes Bluetooth?
A. 802.3
B. 802.11
C. 802.15
D. 802.16
E. 802.1x
Which standard is used in WPAEnterprise but not WPA-PSK?
A. 802.3
B. 802.11
C. 802.15
D. 802.16
E. 802.1x
Which item identifies a server?
A. PAP
B. CHAP
C. LEAP
D. X.509
E. AES
Chapter 12
Cryptography
Which item provides integrity but not
confidentiality?
A. Symmetric encryption
B. Asymmetric encryption
C. Hashing
D. Obfuscation
E. Steganography
Which system is used to create and
distribute certificates?
A. Symmetric encryption
B. Asymmetric encryption
C. Hashing
D. PKI
E. Steganography
Which encryption algorithm is secure
enough for modern use?
A. CSS
B. WEP
C. DES
D. Caesar
E. 3DES
Which item is a symmetric encryption
standard?
A. RSA
B. El Gamal
C. ECC
D. MD5
E. AES
Which item is insecure and has been
replaced by SHA?
A. PGP
B. S/MIME
C. MD5
D. Blowfish
E. CRL
Which item prevents rainbow table
attacks?
A. Stretching
B. Hashing
C. Salting
D. Encryption
E. None of the above
Chapter 13
Protecting Networks
with Security Devices
Which device provides stateful
inspection?
A. Router
B. IDS
C. IPS
D. Honeypot
E. Firewall
Which device can filter packets, but
only based on OSI layer 3 and 4
headers?
A. Router
B. IDS
C. IPS
D. Honeypot
E. Firewall
Which item should not be placed in
the DMZ?
A. Web server
B. Email server
C. WLAN
D. Domain controller
E. FTP server
Which item should have no IP
address?
A. Honeypot
B. IDS
C. IPS
D. WAF
E. Firewall