URL Enumeration and String Manipulation Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What type of host discovery flags does nmap use for TCP SYN/ACK, UDP, or SCTP discovery?

  • PS/PA/PU/PY (correct)
  • PG/PH/PJ/PM
  • PX/PQ/PW/PR
  • PT/PK/PL/PN

What is the process of appending string values onto another string called?

  • Concatenation (correct)
  • Conjunction
  • Compilation
  • Connection

What is the BEST character to test a website for vulnerabilities in input validation?

  • Single quote (correct)
  • Semicolon
  • Double dash
  • Comma

For analyzing 64-bit Windows binaries, which tool can a penetration tester utilize to gauge what an attacker might see?

<p>OllyDbg (C)</p> Signup and view all the answers

What term describes the situation where network traffic no longer reaches the client's IP address due to sinkholing?

<p>Planning process failure (B)</p> Signup and view all the answers

In conducting enumeration on an SMTP server to check for active user accounts, which commands should a penetration tester use?

<p>VRFY and EXPN (B)</p> Signup and view all the answers

What method does a penetration tester want to utilize for reconnaissance without being detected?

<p>Footprinting (D)</p> Signup and view all the answers

Which tool provides Python classes specifically for interacting with network protocols?

<p>Scapy (C)</p> Signup and view all the answers

When performing port scanning for live ports, why is sending a SYN packet considered a good alternative?

<p>It avoids a complete connection setup (C)</p> Signup and view all the answers

When a SOC uses sinkholing on an IP address, what is the primary reason?

<p>To redirect malicious traffic (C)</p> Signup and view all the answers

Which character is least likely to be involved in causing input validation issues on a website?

<h1>(D)</h1> Signup and view all the answers

What type of flag should be chosen when needing to identify if ports are live during a penetration test?

<p>-PS flag (C)</p> Signup and view all the answers

What type of attack involves giving a target a gift, such as an external hard drive, to exploit them?

<p>Baiting (C)</p> Signup and view all the answers

When performing authenticated scans on all servers in a network, which account should a penetration tester use to get the MOST results?

<p>Service account (B)</p> Signup and view all the answers

After cracking user credentials from a database during an assessment, which algorithm was MOST likely used to store the passwords if rainbow tables were effective?

<p>MD5 (B)</p> Signup and view all the answers

What type of attack involves following an authorized person into a secure area?

<p>Tailgating (B)</p> Signup and view all the answers

During a social-engineering attack, if an attacker builds a relationship with an employee over time and then exploits them on a significant day, which attack type is being utilized?

<p>Baiting (A)</p> Signup and view all the answers

If a penetration tester wants to gain comprehensive access to network systems during testing, which account should be used for conducting scans?

<p>Service account (A)</p> Signup and view all the answers

In the context of the Nmap scan results, why might the device be considered a gateway with in-band management services?

<p>It may be vulnerable to Heartbleed bug over TCP/22. (B)</p> Signup and view all the answers

What security concern is associated with the Heartbleed bug in the context of the Nmap scan results?

<p>SSL vulnerability impacting SSH. (D)</p> Signup and view all the answers

What is the main purpose of holding a lessons-learned meeting with the penetration-testing team according to the text?

<p>To identify areas for improvement in security measures. (A)</p> Signup and view all the answers

What is a possible consequence of dropping a malicious USB key with the company's logo in the parking lot?

<p>Introduction of malware into the company network. (B)</p> Signup and view all the answers

Why might an attacker use a brute-force attack against a company's external perimeter?

<p>To gain unauthorized access by finding weak passwords. (D)</p> Signup and view all the answers

What is the purpose of using 'nmap -sS -O 192.168.1.2/24 -T1' command?

<p>To conduct an OS detection on hosts within the given IP range. (C)</p> Signup and view all the answers

After gaining access to a network device with an unknown IP range that is an always-on VPN tunnel, what should a penetration tester do?

<p>Scan the IP range for additional systems to exploit. (D)</p> Signup and view all the answers

What would be an unethical action for a security company conducting an insider-threat assessment on an internal network?

<p>Injecting malware into the enterprise-wide update server to gain access to hosts. (C)</p> Signup and view all the answers

Which action would be considered ethical within the scope of an insider-threat assessment?

<p>Intercepting internal TLS traffic for analysis. (A)</p> Signup and view all the answers

In which situation would scanning a network for additional systems be justified ethically?

<p>When performing a penetration test with explicit permission to scan all devices. (B)</p> Signup and view all the answers

What would be the appropriate response if a penetration tester discovers an unknown IP range on a network device during an assessment?

<p>Scan the IP range to identify other systems for potential exploitation. (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

URL Components Quiz
3 questions
URL Identification Quiz
3 questions

URL Identification Quiz

BrandNewAmethyst avatar
BrandNewAmethyst
URL Parameters Quiz
8 questions
Use Quizgecko on...
Browser
Browser