Podcast
Questions and Answers
What does this sample virus code do? #!/bin/bash while: do echo -e "a" sleep 1 done
What does this sample virus code do? #!/bin/bash while: do echo -e "a" sleep 1 done
To capture all DNS (domain) traffic on the first Ethernet card, which command should be used?
To capture all DNS (domain) traffic on the first Ethernet card, which command should be used?
A sudden power failure in a data center is categorized as a security event impacting availability.
A sudden power failure in a data center is categorized as a security event impacting availability.
True
Which of the following is an example of a Detection Control in risk management?
Which of the following is an example of a Detection Control in risk management?
Signup and view all the answers
What type of network security control protects against IP address spoofing?
What type of network security control protects against IP address spoofing?
Signup and view all the answers
What does the "Plan-Do-Check-Act" (PDCA) model in ISO27001 signify?
What does the "Plan-Do-Check-Act" (PDCA) model in ISO27001 signify?
Signup and view all the answers
To allow netcat to listen on the loopback interface on an FTP port, you use the command: nc -l -p ____
.
To allow netcat to listen on the loopback interface on an FTP port, you use the command: nc -l -p ____
.
Signup and view all the answers
Match the following commands with their correct descriptions:
Match the following commands with their correct descriptions:
Signup and view all the answers
What command captures telnet traffic to and from 10.11.12.3 and saves it to a file?
What command captures telnet traffic to and from 10.11.12.3 and saves it to a file?
Signup and view all the answers
The command 'nc -I 127.0.0.1 -p 22' is used to establish a telnet connection.
The command 'nc -I 127.0.0.1 -p 22' is used to establish a telnet connection.
Signup and view all the answers
What does the given Unix script do?
What does the given Unix script do?
Signup and view all the answers
To ensure an ISO image is not corrupted, a ______ file is provided.
To ensure an ISO image is not corrupted, a ______ file is provided.
Signup and view all the answers
Which statement correctly describes the goals of security concerning illegitimate users?
Which statement correctly describes the goals of security concerning illegitimate users?
Signup and view all the answers
Type the certutil command to generate an MD5 hash for newlinux.iso.
Type the certutil command to generate an MD5 hash for newlinux.iso.
Signup and view all the answers
What is the purpose of the command 'while :' in the Unix script?
What is the purpose of the command 'while :' in the Unix script?
Signup and view all the answers
Match the following commands with their respective purpose:
Match the following commands with their respective purpose:
Signup and view all the answers
Study Notes
Multiple-Choice Questions
-
Question 1: A Unix script repeatedly prints "a" and pauses for 1 second. This script repeatedly restarts the computer.
-
Question 2: To capture all DNS traffic on the first Ethernet card, use
sudo tcpdump -i eth0 -A -port 21
. -
Question 3: A financial services company experienced a power failure in its primary data center which caused a system outage. This should be categorized as a security event impacting availability of services.
-
Question 4: An example of a Detection Control in a risk management framework includes sounding an alarm to alert personnel of an intruder.
-
Question 5: IP Security (IPSec) protects against IP address spoofing and TCP session hijacking.
Additional Questions
-
Question 6: The "Plan-Do-Check-Act" (PDCA) model in ISO27001 is a lifecycle approach to continual improvement in Information Security Management Systems (ISMS).
-
Question 7: To allow Netcat to listen on the loopback interface for FTP port 21, use
nc -I 127.0.0.1 -p 21
. -
Question 8: To capture all telnet traffic to and from 10.11.12.3 and save the traffic to a file named
traffic.pcap
, usetcpdump -i eth0 -w traffic.pcap host 10.11.12.3 and port 23
-
Question 9: A bash script
while :; do touch $RANDOM.txt; done
repeatedly creates a new text file with a random name. -
Question 10: Confidentiality ensures illegitimate users cannot read information, integrity ensures they can't modify, and authentication ensures they can't impersonate legitimate users.
Command-Based Tasks
-
Task 1: To generate an MD5 hash for the ISO image
newlinux.iso
, use thecertutil -hashfile newlinux.iso MD5
command (case is not important). -
Task 2: To perform an nmap port scan in verbose mode on the IPv4 subnet 10.11.12.0/24 use the command
nmap -vv 10.11.12.0/24
. -
Task 3: To scan the host 208.67.201.5 to determine if anonymous login is allowed, use a Metasploit command (exact command is needed).
-
Task 4: To generate a reverse TCP payload file (e.g., for windows) use Metasploit.
-
Task 5: To determine the SMTP server version running on host 192.168.2.1 use a Metasploit auxiliary module
smtp_version
(exact command needs to be written).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on information security, risk management, and network protocols with this quiz. It covers topics such as detection controls, IP security, and ISO27001 procedures. Perfect for students in cybersecurity programs or professionals looking to refresh their skills.