

Chapter 4: Footprinting and Social Engineering
Available Study Resources on Quizplus for this Chatper
51 Verified Questions
51 Flashcards
Source URL: https://quizplus.com/quiz/41513
Sample Questions
Q1) ____ is a tool that is used to read and write data to ports over a network.
A)Whois
B)Netcat
C)Metis
D)Dig
Q2) Elaborate on the following statement: "The most difficult job of a security professional is preventing social engineers from getting crucial information from company employees."
Q3) To see additional parameters that can be used with the ____ command, you can type nc -h at the command prompt.
A)Nslookup
B)Namedroppers
C)Netcat
D)Whois
Q4) With commands such as ____, you can perform zone transfers of all DNS records.
A)Dig
B)Whois
C)DNS
D)Netcat
Q5) As a security tester, should you use social-engineering tactics?
Page 6
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Programming for Security Professionals
Available Study Resources on Quizplus for this Chatper
53 Verified Questions
53 Flashcards
Source URL: https://quizplus.com/quiz/41516
Sample Questions
Q1) A loop usually completes after ____________________ is conducted on a variable and returns a value of true or false.
Q2) List and describe the variable types used in C.
Q3) The C programming language was developed by ____ at Bell Laboratories in 1972.
A)James Gosling
B)Larry Wall
C)Dennis Ritchie
D)Larry Tesler
Q4) In HTML, each tag has a matching closing tag that's written with a(n) ____ added.
A)forward slash (/)
B)backward slash (\)
C)bang (!)
D)ampersand (&)
Q5) The Win32 class contains many functions you can call from your Perl script. How can attackers use these functions? Should security professionals become proficient at using them in a program?
Q6) In programming, what are variables used for?
Q7) Why is documenting computer programs essential?
Q8) What is a dangerous thing about programming in the C language?
To view all questions and flashcards with answers, click on the resource link above. Page 9
Chapter 8: Desktop and Server Os Vulnerabilities
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41517
Sample Questions
Q1) Microsoft's Systems Management Server (SMS) can manage security patches for all computers on a network.
A)True
B)False
Q2) A common Linux rootkit is ____.
A)Back Orfice
B)Kill Trojans
C)Packet Storm Security
D)Linux Rootkit 5
Q3) The best way to protect a network from SMB attacks is to make sure routers filter out ports 137 to 139 and ____.
A)135
B)389
C)445
D)636
Q4) What is the purpose of a file system?
Q5) In Microsoft systems, an excellent resource for finding configuration errors, missing patches, and so on is the ________________________________________.
Q6) What is Samba used for?

Page 10
To view all questions and flashcards with answers, click on the resource link above.
Chapter 9: Embedded Operating Systems: The Hidden Threat
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41518
Sample Questions
Q1) Wind River produces an open-source Linux OS for embedded systems and an OS microkernel extension called ____.
A)RTEMS
B)QNX
C)VxWorks
D)RTLinux
Q2) What is the collective name for embedded versions of Windows Enterprise OSs, such as XP Professional, Windows Vista Business and Ultimate, and Windows 7 Ultimate and Professional?
A)Windows Business Suites
B)Embedded Systems Suite
C)Embedded Windows Servers
D)Windows Embedded Enterprise
Q3) One type of specialized embedded OS is a(n) ____, typically used in devices such as programmable thermostats, appliance controls, and even spacecraft.
A)RTOS
B)VoP
C)MILS
D)SCADA

Page 11
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Hacking Web Servers
Available Study Resources on Quizplus for this Chatper
52 Verified Questions
52 Flashcards
Source URL: https://quizplus.com/quiz/41519
Sample Questions
Q1) What is ODBC used for?
Q2) CGI programs can be written in many different programming and scripting languages, such as C/C++, Perl, UNIX shells, Visual Basic, and FORTRAN.
A)True
B)False
Q3) ____________________ Web pages can vary the information that's displayed depending on variables such as the current time and date, user name, and purchasing history (information collected via cookies or Web bugs).
Q4) ____, developed by Microsoft, is a set of interfaces that enable applications to access data stored in a database management system.
A)OLE DB
B)ODBC
C)ADO
D)JDBC
Q5) Web applications written in CFML can also contain other client-side technologies, such as HTML and JavaScript.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Hacking Wireless Networks
Available Study Resources on Quizplus for this Chatper
52 Verified Questions
52 Flashcards
Source URL: https://quizplus.com/quiz/41520
Sample Questions
Q1) WPA improves encryption by using ____.
A)WEP
B)TKIP
C)802.1X
D)RADIUS
Q2) The ____ standard has improvements to address the problem of interference.
A)802.11a
B)802.11b
C)802.11e
D)802.11g
Q3) There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.
A)True
B)False
Q4) What is the role of a WNIC?
Q5) The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected. A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 13
Chapter 12: Cryptography
Available Study Resources on Quizplus for this Chatper
58 Verified Questions
58 Flashcards
Source URL: https://quizplus.com/quiz/41521
Sample Questions
Q1) uses a single key to encrypt and decrypt data
A)asymmetric encryption
B)collision free
C)symmetric encryption
D)certificate
E)hashing
F)collision
G)stream cipher
H)message digest
I)block cipher
Q2) What is a substitution cipher?
Q3) What is RC5?
Q4) In a chosen-ciphertext attack, the attacker needs access to the cryptosystem to perform the attack.
A)True
B)False
Q5) Asymmetric algorithms are more scalable than symmetric systems. However, they are slower than symmetric algorithms.
A)True
B)False

Page 14
To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Network Protection Systems
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41522
Sample Questions
Q1) What is a path-vector routing protocol?
Q2) internal private IP addresses are mapped to public external IP addresses
A)stateful packet filter
B)firewall
C)NAT
D)DMZ
E)stateless packet filter
F)user mode
G)enable mode
H)ASA
I)privileged mode
Q3) List the components of a Cisco router.
Q4) ____ runs hacker-enticing services and written and documented in Portuguese, but the easy-to-use graphical interface makes up for any time spent translating.
A)Valhala
B)Honeyd
C)Nepenthes
D)SANS Internet Storm Center
Q5) What is honeyd? How does it work?
Q6) How do you know what mode a Cisco router is in?
Page 15
To view all questions and flashcards with answers, click on the resource link above.