Review questions

  1. If I install a freeware program that analyses my computer and then it finds 40,000 exploits and asks me to purchase the full version, what type of attack is this?
  2. What is crypto-malware?
  3. What type of virus replicates itself and uses either ports 4444 or 5000?
  4. What type of virus inserts a .dll into either the SysWOW64 or System 32 folder?
  5. What is a RAT?
  6. What type of virus attacks the windows/system 32 folder on Windows, or the bin/ and /usr/bin/ on Linux
  7. How does a logic bomb virus work?
  8. What is the purpose of a keylogger?
  9. What is a botnet?
  10. Explain a phishing attack.
  11. How does spear phishing differ from a phishing attack?
  12. What is a whaling attack?
  13. What type of attack it is if I leave a voicemail?
  14. What is social engineering tailgating?
  15. What is social engineering?
  16. What type of attack is it if I dress as a policeman?
  17. What type of attack is it if a fireman arrives and you let him into the server room to put out a fire?
  18. What type of attack is it if I am in an ATM queue and someone has his phone to one side so that he can film the transaction?
  19. What type of attack is distributing fake software?
  20. What is a watering hole attack?
  21. What type of attack is it if I receive an email from the CEO telling me to complete the form below by clicking on a link in the email?
  22. One of the bosses asks me to give him the information of one of my peers gave him last week. I am not too sure, but I give him the information; what type of attack is this?
  23. What type of attack is a multiple Syn flood attack on a well-known website that takes it down?
  24. Explain a man-in-the middle attack.
  1. How does a replay attack differ from a man-in-the-middle?
  2. What type of attack is a man-in-the-middle attack using a SSL3.0 browser that uses a Chain Block Cipher (CBC)?
  3. What type of attack is a man-in-the-browser attack?
  4. How can I prevent a replay attack in a Microsoft environment?
  5. How can I prevent a pass the hash attack?
  6. What type of attack uses HTML tags with JavaScript?
  7. What type of exploit has no patches and cannot be detected by the NIDS or NIPS?
  8. What is domain hijacking?
  9. What is blue jacking?
  10. What is Bluesnarfing? 
  11. What type of attack does the attacker need to be local and how can I prevent that attack?
  12. For what type of attack do I use the tool strcpy for?
  13. What is an integer overflow attack?
  14. What type of attack uses the phrase 1=1?
  15. Name two methods to prevent the attack in question 36.
  16. What type of attack is session hijacking?
  17. If I misspell a website but still get there, what type of attack is this?
  18. What type of attack would I use shimming or refactoring for?
  19. What type of attack is susceptible to a birthday attack?
  20. What are rainbow tables?
  21. How can I store passwords to prevent a dictionary attack?
  22. Name two tools that can be used for key stretching.
  23. What is the fast password attack that can crack any password?
  24. What is the only way to prevent a brute force attack?
  25. What can we do to slow down a brute force attack?
  26. What type of authentication is the most prone to errors?
  27. What is an evil twin?
  28. How can I prevent an attack by a rogue WAP?
  29. I am trying to use the internet but my wireless session keeps crashing—what type of attack is this?
  30. How close does an attacker need to be for an NFC attack?
  31. If I have no information on the system but at the last minute the IT manager gives me the local admin account, what type of penetration test is this?
  32. How much information does a black box pen tester have?
  33. How much information does a white box pen tester have?
  34. Which type of vulnerability scan can I use for auditing?
  35. If I carry out a non-credentialed vulnerability scan, what will I find?
  36. What type of reconnaissance is it if I try and obtain a password reset?
  37. What type of reconnaissance is it if I actively listen?
  38. What is a pivot?
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.136.97.64