Security Protocols and Access Control

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Listen to an AI-generated conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which type of hacker may use their skills for both benign and malicious goals at different times?

  • Black hat
  • White hat
  • Suicide hacker
  • Gray hat (correct)

What is the primary goal of a hacktivist?

  • To disrupt business operations
  • To bring about political or social change (correct)
  • To steal sensitive information
  • To gain unauthorized access to a system

What is the key characteristic of a suicide hacker?

  • Disregard for the law
  • Intent to reform
  • Lack of fear of being caught (correct)
  • Desire to be helpful

What is the primary focus of vulnerability research?

<p>Passively uncovering vulnerabilities (A)</p>
Signup and view all the answers

What is the purpose of a contract in penetration testing?

<p>To provide proof of testing (B)</p>
Signup and view all the answers

At which layer of the OSI model does a device that uses node MAC addresses to funnel traffic operate?

<p>Layer 2 (D)</p>
Signup and view all the answers

What does TOE stand for in the context of penetration testing?

<p>Target of evaluation (A)</p>
Signup and view all the answers

What is the primary function of a proxy operating at the Application layer of the OSI model?

<p>Caching frequently requested resources (D)</p>
Signup and view all the answers

What is the most common desktop operating system, which is also a large attack surface?

<p>Windows (A)</p>
Signup and view all the answers

Which port is used for secure web traffic using SSL?

<p>443 (A)</p>
Signup and view all the answers

What type of network topology uses a token-based access methodology?

<p>Ring (D)</p>
Signup and view all the answers

What is the sequence of the TCP three-way-handshake?

<p>SYN, SYN-ACK, ACK (A)</p>
Signup and view all the answers

What type of firewall inspects packets at the most granular level possible while providing improved traffic efficiency?

<p>Application firewall (B)</p>
Signup and view all the answers

What Google command is used to search files using a specific file extension on a target website?

<p>site: target.com filetype:xls username password email (B)</p>
Signup and view all the answers

What type of OS fingerprinting technique involves analyzing the response to specially crafted packets?

<p>Active (B)</p>
Signup and view all the answers

What access control mechanism allows for central authentication and access to multiple systems?

<p>Single Sign-On (SSO) (D)</p>
Signup and view all the answers

What is the primary function of an application firewall?

<p>Inspecting packets at the application layer (D)</p>
Signup and view all the answers

What is the goal of using Google commands for data analysis?

<p>To gather information about system functions and documentation (D)</p>
Signup and view all the answers

What is the primary focus of a security audit or vulnerability assessment?

<p>Locating vulnerabilities (B)</p>
Signup and view all the answers

What restricts access to a single individual at any one time?

<p>Mantrap (B)</p>
Signup and view all the answers

Which mechanism manages digital certificates through a system of trust?

<p>PKI (B)</p>
Signup and view all the answers

What protocol is used to create a secure environment in a wireless network?

<p>WPA (B)</p>
Signup and view all the answers

What type of exercise is conducted with full knowledge of the target environment?

<p>White box (A)</p>
Signup and view all the answers

Which technology would best establish a network connection between two LANs using the Internet?

<p>L2TP (D)</p>
Signup and view all the answers

Which regulation defines security and privacy controls for Federal information systems and organizations?

<p>NIST SP 800-53 (A)</p>
Signup and view all the answers

What is the primary purpose of DNSSEC?

<p>To prevent DNS poisoning and spoofing attacks (D)</p>
Signup and view all the answers

Which statement regarding ethical hacking is incorrect?

<p>Ethical hackers should never use tools or methods that have the potential of exploiting vulnerabilities. (B)</p>
Signup and view all the answers

What type of security policy defines the use of VPN for gaining access to an internal corporate network?

<p>Remote access policy (D)</p>
Signup and view all the answers

What is the best nmap command to enumerate all machines in the network 10.10.0.0/24?

<p>nmap -T4 -F 10.10.0.0/24 (D)</p>
Signup and view all the answers

What is the primary goal of penetration testing?

<p>To identify vulnerabilities in an organization's systems. (B)</p>
Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Seguridad en Instalaciones Públicas
10 questions
Remote Access Control Overview
5 questions

Remote Access Control Overview

AppropriateMoldavite6998 avatar
AppropriateMoldavite6998
Flughafenausweis und Identitätsprüfung
62 questions
Use Quizgecko on...
Browser
Browser