Test#1Ethical hacking

docx

School

Humber College *

*We aren’t endorsed by this school

Course

CNET331

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

22

Uploaded by DukeCaterpillarMaster966

Report
Midterm Fall 2023 X o 0:54:16 remaining Previous Page - Page 1 of 24 Question 1 (1 point) Saved o) Listen | p ] Least privilege is a security concept that requires that a user is? (3) limited to those functions required to do the job. O trusted to keep all data and access to that data under their sole control (\) given privileges equal to everyone else in the department. [) given root or administrative privileges. Previous Page = Page 1 of 24 Submit Quiz 3 of 24 questions saved
Midterm Fall 2023 X O 0:53:36 remaining Previous Page - Page 2 of 24 - Question 2 (1 point) Saved < Listen | » | A company recently hired your team of Ethical Hackers to test the security of their network systems. The company wants to have the attack be as realistic as possible. They did not provide any information besides the name of their company. What phase of security testing would your team jump in right away? r\’) Privileges Escalation \’\ Gaining Access O Scanning (®) Reconnaissance (") Enumeration roisrese () Page 2
Midterm Fall 2023 O 0:53:15 remaining Previous Page - Question 3 (1 point) Saved < Listen | » | Page 3 of 24 Attackers use image files to hide some information for malicious purposes. What type of technique did the attacker perform? (") Spyware @) Steganography C b ) Backdoor N () Cryptography Previous Page = Submit Quiz 3 of 24 questions saved Page 3 of 24
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Midterm Fall 2023 X O 0:51:14 remaining Previous Page Page 4 of 24 Question 4 (1 point) Saved o) Listen | p ] Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGls? (") Hping2/3 () Wireshark (®) Nikto () T-Shark () Snort \‘) John the Ripper Previous Page = Page 4 of 24
Midterm Fall 2023 X O 0:47:30 remaining Previous Page - Page 5 of 24 Question 5 (1 point) Saved < Listen | » | A hacker has managed to gain access to a Linux host and stolen the password file from/etc/passwd. How can he use it? G)‘ The password file does not contain the passwords ~ themselves (\) The file reveals the passwords to the root user only [) He cannot read it because it is encrypted \’) He can open it and read the user ids and corresponding ~ passwords Previous Page = Page 5 of 24 Submit Quiz 5 of 24 questions saved
The correct option is: "The password file does not contain the passwords themselves." In Linux systems, the " /etc/passwd" file contains basic user account information, such as usernames, user IDs (UIDs), group IDs (GIDs), home directories, and shell information. However, it does not contain the actual passwords in plaintext. User passwords are typically stored in a separate file, such as " /etc/shadow’, and are stored as hashed values, not in plaintext. So, the hacker cannot read the actual passwords from the " /etc/passwd " file because they are not stored there in plaintext. Instead, the hashed password values are stored in the " /etc/shadow" file, which is typically protected and accessible only to the root user or users with specific permissions. Access to the /etc/passwd" file, while potentially revealing user account information, does not provide access to the plaintext passwords. Send a message °@ Free Research Preview. ChatGPT may produce inaccurate information about people, places, or facts. ChatGPT September 25 Version Midterm Fall 2023 X . o 0:46:43 remaining Page 5 of 24 Previous Page Question 5 (1 point) Saved A hacker has managed to gain access to a Linux host and stolen the password file from/etc/passwd. How can he use it? (@) The password file does not contain the passwords O themselves [’/\ The file reveals the passwords to the root user only ”) He cannot read it because it is encrypted He can open it and read the user ids and corresponding passwords Page 5 of 24 Previous Page © R Fofma it
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
IVIIULET T Fdil £UZ£D A O 0:44:22 remaining Previous Page Page 6 of 24 - Question 6 (1.5 points) Saved o) Listen | p Hyena is a tool to manages and secures Windows operating systems and uses a Windows Explorer-style interface for all operations. It shows shares and user login names for Windows servers and domain controllers. What is the purpose of using this tool? [e] DP Enumeration MTP Enumeration v v NMP Enumeration @ NETBIOS Enumeration ( ) LDAP Enumeration Previous Page = Page 6 - o A E L P ENG el LLSEAM | el
Midterm Fall 2023 X O 0:42:27 remaining Previous Page - Page 7 of 24 Question 7 (1 point) Saved < Listen | » | An authoritative name server is where administrators manage server names and IP addresses for their domains. (o) True () False Previous Page = Page 7 of 24 Submit Quiz 7 of 24 questions saved
Midterm Fall 2023 X \) 0:41:25 remaining Previous Page Question 8 (1 point) Saved o) Listen >] Which of the following command line switch would you use for OS detection in Nmap? Previous Page
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Midterm Fall 2023 X J 0:40:08 remaining Previous Page - Page 9 of 24 Question 9 (1 point) Saved < Listen | » | What is the command to launch METASPLOIT ? . () Msfadmin (e) Msfconsole ~ (_) Msconsole (*) Msadmin Previous Page = Page 9 of 24 Submit Quiz 9 of 24 questions saved
Midterm Fall 2023 X 3 0:35:03 remaining Question 10 (1 point) Saved o) Listen | p CVSS is a published standard that provides an open framework for communicating the characteristics and impacts of IT vulnerabilities. CVSS assessment consists of three metrics for measuring vulnerabilities. Which of the following is the best definition of base metric? (\") Represents the features that keep on changing during the ~ lifetime of vulnerability () Represents the vulnerabilities that are based on a particular ~ N s . environment or implementation \’) Represent the type of vulnerability (\3) Represents the inherent qualities of a vulnerability Previous Page = Page 10 of 24
Default (GPT-3.5) ul Clear text authentication Web portal data leak An open port 25 on a server typically indicates the presence of an SMTP (Simple Mail Transfer Protocol) service, which is used for sending and receiving email. The risk posed by an open port 25 is often associated with the potential for email-related vulnerabilities, and the primary risk in this context is "Active mail relay." * Active Mail Relay: An open port 25 could potentially be exploited by attackers to abuse the server as an open mail relay. An open relay allows unauthorized users to send email through the server, which can lead to email spam, phishi attacks, and the unauthorized use of email resources. Send a message © @ o Free Research Preview. ChatGPT may produce inaccurate information about people, places, or ? Midterm Fall 2023 ) 0:32:26 remaining Previous Page Question 11 (1 point) Saved Page An NMAP scan of a server shows port 25 is open. What r could this pose? ) Open printer sharing Active mail relay Clear text authentication (") Web portal data leak Previous Page Submit Quiz 11 of 24 questions saved Page
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Midterm Fall 2023 X ) 0:31:00 remaining Previous Page - Page 12 of 24 Question 12 (1 point) Saved < Listen | » | If you want only to scan fewer ports than the default scan using Nmap tool, which option would you use? O ®-F Qr O Previous Page = Page 12 of 24 Submit Quiz 12 of 24 questions saved
Midterm Fall 2023 ) 0:28:14 remaining Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux server occurring during non- business hours. After further examination of all login activities, it is noticed that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realizes the system time on the Linux server is wrong by more than twelve hours. What protocol used on Linux servers to synchronize the time has stopped working? (\j PPP () Time Keeper @ w\:) OSPP Previous Page Submit Quiz 13 of 24 auestion: aved Page 13 of 24
Midterm Fall 2023 X ) 0:26:53 remaining Previous Page - Page 14 of 24 Question 14 (1 point) Saved < Listen | » | An attacker commissioned by the governments to attack enemies' information systems, license to hack? (") Script Kiddies () Hactivists (@) Nation state actor () Insiders () Brokers Previous Page = Page 14 of 24 Submit Quiz 14 of 24 questions saved
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
The use of multiple layers of anti-virus defense, including end-user desktop anti-virus and an email gateway, is primarily employed to mitigate "Scanning Attacks." Scanning attacks involve automated tools or scripts that scan networks and systems to identify vulnerabilities or potential targets for exploitation. These attacks are not limited to a specific type of malware but rather encompass a wide range of scanning techniques used by attackers to identify and exploit weaknesses in a network or system. By employing multiple layers of anti-virus and security defense, organizations can enhance their ability to detect and prevent scanning attacks by identifying and blocking malicious software or activities that may be part of a scanning attack. These security measures help safeguard against vulnerabilities that attackers may be attempting to exploit during scanning. :nd a message @ Free Research Preview. ChatGPT may produce inaccurate information about people, places, or ? facts. ChatGPT September 25 Version 7 v e ey Question 15 (1 point) Saved Previous Page Page 15 of 24 A security consultant decides to use multiple layers of anti-virus defense, such as end userdesktop anti-virus and E-mail gateway. This approach can be used to mitigate which kind of attack? \) Social engineering attack () ARP spoofing attack (O Forensic attack @ Scanning Attack 15 of 24 questions saved Q Previous Page Page 15 of 24 Submit Quiz
Midterm Fall 2023 X j 0:21:53 remaining Previous Page - Page 16 of 24 Question 16 (1 point) Saved < Listen | » | Craig received a report of all the computers on the network that showed all the missing patches and weak passwords. What type of software generated this report? () Port Scanner () Heuristic Scanner (") Virus Scanner (\i) Vulnerability Scanner (") Malware Scanner @ Google Chrome X Previous Page = SELL AND BUY ~Santa Carne: s Photo web.whatsapp.com
Midterm Fall 2023 X \ 0:19:26 remaining Previous Page Page 17 of 24 Question 17 (1 point) Saved = | o) Listen | p ] What port number is used by LDAP protocol? () 445 0110 () as4 0139 0225 (e ;) 389 Previous Page = Page 17 of 24 Submit Quiz 17 of 24 auestinns saved.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Midterm Fall 2023 X N 0:16:09 remaining Previous Page Page 18 of 24 Question 18 (1 point) Saved o) Listen | p ] What is the proper response for a NULL scan if the port is closed? ) PSH ) SYN ACK RST OO (RO RY) ~ (\.) No Response Previous Page = Page 18 of 24
Midterm Fall 2023 N 0:14:44 remaining Previous Page - Page 19 of 24 Question 19 (1 point) Saved < Listen | » | Which of the following techniques will identify if computer files have been changed? () Permission sets 3) Integrity checking hashes () Firewall alerts ( ’) Network sniffing Previous Page = Page 19 of 24 Submit Quiz 19 of 24 questions saved
= | If executives are found liable for not properly protecting their company’s assets and information systems, the type of law that would typically apply in this situation is "Civil Law." In the context of cybersecurity and liability for failing to protect assets and information systems, civil law often comes into play. This is because civil law deals with disputes and legal issues between individuals, organizations, or entities. When executives are held liable for breaches of cybersecurity, it's typically through civil actions, such as lawsuits brought by affected parties or regulatory bodies. Criminal law may also be applicable in cases of severe cybercrimes, but civil law is more commonly associated with addressing liability for failing to protect assets and information systems. v end a message (+XC) Free Research Preview. ChatGPT may produce inaccurate information about people, places, or ? The Nmap scan that indicates it does not completely open a TCP 3-way connection is the "Zombie Scan.” The Zombie Scan is a unique Nmap scanning technique that uses an idle host (the "zombie") to send packets to a target host. The zombie host doesn't complete the TCP 3-way handshake; instead, it sends SYN packets to the target and listens for the response. The zombie scan leverages the target's response to determine open, closed, or filtered ports, all without directly establishing a full connection. The other scan types mentioned (Ack Scan, Stealth Scan, Xmas Scan, and TCP Scan) involve various TCP flags and scanning methods, but they often involve establishing at least part of a TCP connection, unlike the Zombie Scan. s m mmmmnma LYY Previous Page Page 20 of 24 Question 20 (1 point) Saved If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation? () Jurisdiction g\ () Civil () Criminal N\ 0 O International N\ (_) Common Previous Page Page 20 of 24 © Fred can accomplish this by sending an IP packet with the "SYN" bit and the source address of his computer. In this context, Fred is trying to initiate a TCP connection with the switch by sending a packet with the "SYN" (synchronize) flag set. This is part of the TCP three-way handshake, and it's used to establish a new connection. By spoofing the source address of his computer, the switch might believe that the connection has been initiated by his computer, even though it hasn't. The other options mentioned involve different flags or combinations that don't typically trick a switch into thinking an established session exists. Fred is the network administrator for his company. Fred is testing an internal switch.From an external IP address, Fred wants to try and trick this switch into thinking it already hasestablished a session with his computer. How can Fred accomplish this? (™ Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address ofhis computer (’) Fred can send an IP packet with the ACK bit set to zero and " the source address of the switch (@) He can send an IP packet with the SYN bit and the source ~ address of his computer O Fred can send an IP packet to the switch with the ACK bit and the source address of his machine Previous Page Page 21 of 2 v rananng Previous Page m Page 22 of 24 Question 22 (1 point) Saved Which Nmap scan indicates that it does not completely open a TCP 3 way connection? (@) Zombie Scan (") Ack Scan () Stealth Scan (*) Xmas Scan () TCPSCan Previous Page m Page 22 of 24
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
The Nmap command “nmap -sX -T4 -F' is performing an Xmas Scan, which is used to probe a target system to determine the state of its ports. In an Xmas Scan, when the port is closed, it will often respond to the scan witha RST (reset) packet. When the port is open, it may not respond to the scan at all. In some cases, it may respond with a RST packet. When the port is filtered, it will not respond to the scan at all. So, the correct answer is: Port is closed or Filtered. °@ nd a message Free Research Preview. ChatGPT may produce inaccurate information about people, places, or An example of two-factor authentication is Fingerprint and Smartcard ID. Two-factor authentication (2FA) is a security process in which a user provid two different authentication factors to verify their identity. These factors can fall into three categories: something you know (like a password or PIN), something you have (like a smartcard or hardware token), and something you are (biometric data like a fingerprint). In this example, the two factors used are something you have (the smartcard) and something you are (the fingerprint). This combination enhances security by requiring two distinct forms of authentication. The other options listed do not represent two-factor authentication: * Digital Certificate and Hardware Token involve two factors but not something you are, so it's not an example of biometric-based 2FA. * PIN Number and Birth Date is a combination of something you know, but it lacks the something you have or something you are factor, so it's not 2FA. * Username and Password is a single-factor authentication, as it involves only °0 something you know. 1d a message Free Research Preview. ChatGPT may produce inaccurate information about people, places, or Previous Page Question 23 (1.5 points) Page 23 ¢ Saved pen-tester# nmap -sX -T4 -F (®) Port is closed or Filtered (D Port is open or Filtered () Port s Filtered () Port is closed Q Port is Open Previous Page Page 23 ¢ Submit Quiz 23 of 24 questions saved 0:00:31 remaining rrevious rage INext rage Fdge 24 O 244 Question 24 (1 point) Saved Which of the following is an example of two factor authentication? Fingerprint and Smartcard ID Digital Certificate and Hardware Token (") PIN Number and Birth Date () Username and Password Previous Page Next Page Page 24 of 24 m 24 of 24 questions saved
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: = 7. Consider the set Seq[N] of all the infinite sequences (ak)ken = (ao, a₁, a2, a3,...) of natural…
Q: A swimmer looking directly down at a lamp at the bottom of a swimming pool observes that the lamp…
Q: If n=22, x=40, and s=3, find the margin of error at a 90% confidence level using the critical value…
Q: A normal distribution has a mean of 77 and a standard deviation of 6. Find the z-score for a data…
Q: 3.5.2 (revised). A wrought iron pipe, 1.50 feet in diameter and 100 feet long, carries 12 cfs…
Q: The water in a tank is pressurized by air, and the pressure is measured by a multifluid manometer as…
Q: Consider the following relational schema: Student (sid, sname, dept) Enroll (cid, sid, grade,…
Q: what happens if the chromosomes within an individual are not tightly packed. How does this affect…
Q: 2. How many ways are there to arrange the letters in the following words? (a) CRABS (b) САСАО (с)…
Q: calculate the Taylor polynomials T2 and T3 centered at x = a for the given function and value of a.…
Q: Choose the best answers for each missing word from the list below. (1)________ is a first messenger…
Q: Use the General Power Rule to find the derivative of the function. g(x) = 5/(7x2 + 4x)3 g'(x) =
Q: For the function below, find the intervals where the value of the function is positive, and…
Q: The nominal exchange rate is the price of one currency in terms of another currency. A nominal…
Q: Plot the complex number on the complex plane and write it in polar form and in exponential form.…
Q: A uniformly charged, straight filament 4.40 m in length has a total positive charge of 2.00 µC. An…
Q: What is the net ionic equation for the reaction below?  2 FeCl3(aq)  +  3 Ca(OH)2(aq)  →  3…
Q: Calculate the concentration of Hg2+(aq) in solution at equilibrium after 10.0 mL of a 0.0210 M…
Q: a. Using the pairs of values for all 10 ​points, find the equation of the regression line. b. After…
Q: If the allowable bending stresses for a beam in one application is 6 kip/in2 in tension. The…
Q: If sin(0): tan (0) = = 7 12 I find the exact value of tan(0) where << . 2
Q: 7. Let A = {a, b, c, d}, B = {c, d, e}, and C = {f, g, h, i}. (a) How many functions are there from…