URL Enumeration and String Manipulation Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of host discovery flags does nmap use for TCP SYN/ACK, UDP, or SCTP discovery?

  • PS/PA/PU/PY (correct)
  • PG/PH/PJ/PM
  • PX/PQ/PW/PR
  • PT/PK/PL/PN

What is the process of appending string values onto another string called?

  • Concatenation (correct)
  • Conjunction
  • Compilation
  • Connection

What is the BEST character to test a website for vulnerabilities in input validation?

  • Single quote (correct)
  • Semicolon
  • Double dash
  • Comma

For analyzing 64-bit Windows binaries, which tool can a penetration tester utilize to gauge what an attacker might see?

<p>OllyDbg (C)</p> Signup and view all the answers

What term describes the situation where network traffic no longer reaches the client's IP address due to sinkholing?

<p>Planning process failure (B)</p> Signup and view all the answers

In conducting enumeration on an SMTP server to check for active user accounts, which commands should a penetration tester use?

<p>VRFY and EXPN (B)</p> Signup and view all the answers

What method does a penetration tester want to utilize for reconnaissance without being detected?

<p>Footprinting (D)</p> Signup and view all the answers

Which tool provides Python classes specifically for interacting with network protocols?

<p>Scapy (C)</p> Signup and view all the answers

When performing port scanning for live ports, why is sending a SYN packet considered a good alternative?

<p>It avoids a complete connection setup (C)</p> Signup and view all the answers

When a SOC uses sinkholing on an IP address, what is the primary reason?

<p>To redirect malicious traffic (C)</p> Signup and view all the answers

Which character is least likely to be involved in causing input validation issues on a website?

<h1>(D)</h1> Signup and view all the answers

What type of flag should be chosen when needing to identify if ports are live during a penetration test?

<p>-PS flag (C)</p> Signup and view all the answers

What type of attack involves giving a target a gift, such as an external hard drive, to exploit them?

<p>Baiting (C)</p> Signup and view all the answers

When performing authenticated scans on all servers in a network, which account should a penetration tester use to get the MOST results?

<p>Service account (B)</p> Signup and view all the answers

After cracking user credentials from a database during an assessment, which algorithm was MOST likely used to store the passwords if rainbow tables were effective?

<p>MD5 (B)</p> Signup and view all the answers

What type of attack involves following an authorized person into a secure area?

<p>Tailgating (B)</p> Signup and view all the answers

During a social-engineering attack, if an attacker builds a relationship with an employee over time and then exploits them on a significant day, which attack type is being utilized?

<p>Baiting (A)</p> Signup and view all the answers

If a penetration tester wants to gain comprehensive access to network systems during testing, which account should be used for conducting scans?

<p>Service account (A)</p> Signup and view all the answers

In the context of the Nmap scan results, why might the device be considered a gateway with in-band management services?

<p>It may be vulnerable to Heartbleed bug over TCP/22. (B)</p> Signup and view all the answers

What security concern is associated with the Heartbleed bug in the context of the Nmap scan results?

<p>SSL vulnerability impacting SSH. (D)</p> Signup and view all the answers

What is the main purpose of holding a lessons-learned meeting with the penetration-testing team according to the text?

<p>To identify areas for improvement in security measures. (A)</p> Signup and view all the answers

What is a possible consequence of dropping a malicious USB key with the company's logo in the parking lot?

<p>Introduction of malware into the company network. (B)</p> Signup and view all the answers

Why might an attacker use a brute-force attack against a company's external perimeter?

<p>To gain unauthorized access by finding weak passwords. (D)</p> Signup and view all the answers

What is the purpose of using 'nmap -sS -O 192.168.1.2/24 -T1' command?

<p>To conduct an OS detection on hosts within the given IP range. (C)</p> Signup and view all the answers

After gaining access to a network device with an unknown IP range that is an always-on VPN tunnel, what should a penetration tester do?

<p>Scan the IP range for additional systems to exploit. (D)</p> Signup and view all the answers

What would be an unethical action for a security company conducting an insider-threat assessment on an internal network?

<p>Injecting malware into the enterprise-wide update server to gain access to hosts. (C)</p> Signup and view all the answers

Which action would be considered ethical within the scope of an insider-threat assessment?

<p>Intercepting internal TLS traffic for analysis. (A)</p> Signup and view all the answers

In which situation would scanning a network for additional systems be justified ethically?

<p>When performing a penetration test with explicit permission to scan all devices. (B)</p> Signup and view all the answers

What would be the appropriate response if a penetration tester discovers an unknown IP range on a network device during an assessment?

<p>Scan the IP range to identify other systems for potential exploitation. (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

URL Components Quiz
3 questions
URL Identification Quiz
3 questions

URL Identification Quiz

BrandNewAmethyst avatar
BrandNewAmethyst
URL Parameters Quiz
8 questions
Use Quizgecko on...
Browser
Browser