100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Ethical Hacking Exam 2 (Book Questions) with Questions and Correct Answers $8.99   Add to cart

Exam (elaborations)

Ethical Hacking Exam 2 (Book Questions) with Questions and Correct Answers

 1 view  0 purchase
  • Course
  • Ethical Hacking
  • Institution
  • Ethical Hacking

How can a Linux user list which processes are running if he suspects something has been loaded thatis not approved? The ps command gives a snapshot of the currently running processes, including ps itself. You have been hired by Bob's Burgers to scan its network for vulnerabilities. They would like...

[Show more]

Preview 2 out of 11  pages

  • September 23, 2024
  • 11
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Ethical Hacking
  • Ethical Hacking
avatar-seller
twishfrancis
Ethical Hacking Exam 2 (Book
Questions) with Questions and Correct
Answers
How can a Linux user list which processes are running if he suspects something has
been loaded thatis not approved? ✅The ps command gives a snapshot of the currently
running processes, including ps itself.

You have been hired by Bob's Burgers to scan its network for vulnerabilities. They
would like you toperform a system-level scan. Which of the following programs should
you use? ✅SARA is a system-level scanner that can scan various ports and attempt to
verify what is running on each and what vulnerabilities are present. Answer A is
incorrect because Flawfinder is a source code scanner.

You have been able to get a Terminal window open on a remote Linux host. You now
need to use acommand-line web browser to download a privilege-escalation tool. Which
of the following willwork? ✅Lynx is a basic browser that can be used to pull down the
needed code.

While hacking away at your roommate's Linux computer, you accessed his passwd file.
Here is whatyou found.root :x: 0 : 0 : root: /root : /bin/bashbin : x : 1 : 1 : bin : /bin
:daemon : x : 2 : 2 : daemon : /sbin :Where is the root password? ✅The password has
been shadowed. You can determine this because there is an x in the second field.

Which of the following will allow you to set the user to full access, the group to read-
only, and allothers to no access? ✅The command for file and folder permissions is
chmod , and the proper setting would be 740 .

our team lead has asked you to make absolute changes to a file's permissions.Which of
the following would be correct? ✅Absolute mode will require the use of octal values,
such as chmod 320 .

Which of the following is not a valid Linux user group? ✅The three valid groups in Red
Hat Linux are super users, system users, and normal users.

You have been exploring the files and directory structure of the new Linux server. What
are theentries of the /etc/hosts file made up of? ✅. The /etc/host file stores IP
addresses and is used for hostname-to-IP address resolution.

At the prompt of your Linux server, you enter cat /etc/passwd. In the following output
line,what is the function of 100? ✅The structure of the passwd file is such: Account

, Name:Password:UID:GID:User Information:Directory:Program. In this case, the 100
falls under the GID.

Where will an attacker find the system password file in a Linux machine that is restricted
to root andcontains encrypted passwords? ✅The shadow file is used to prevent
hackers and ordinary users from viewing encrypted passwords.

You have just completed a scan of your servers, and you found port 31337 open. Which
of the following programs uses that port by default? ✅BOK uses port 31337 by default.

Which of the following programs can be used for port redirection? ✅FPipe is a source
port forwarder/redirector. It can create a TCP or UDP stream with a source port of your
choice.

Which of the following best describes a covert communications? ✅Covert
communications can be described as sending and receiving unauthorized information or
data between machines without alerting any firewalls and IDSes on a network.

Which of the following best describes Netcat? ✅Netcat is a network utility for reading
from and writing to network connections on either TCP or UDP. Because of its
versatility, Netcat is also called the TCP/IP Swiss army knife.

One of your user's Windows computers has been running slowly and performing
erratically. After looking it over, you find a suspicious-looking file named watching.dll.
Which of the following programs uses that file? ✅Watching.dll is one of the files that is
loaded when SubSeven is installed.

Jane has noticed that her system is running strangely. However, even when she ran
Netstat, everything looked fine. What should she do next? ✅Jane should use a third-
party tool that is known good. One way to ensure this is to download the file only from
the developer's website and to verify that the fingerprint or MD5sum of the tool has
remained unchanged.

You overheard a co-worker who is upset about not getting a promotion threaten to load
FakeGina on to the boss's computer. What does FakeGina do? ✅FakeGina captures
login usernames and passwords that are entered at system startup.

Which covert communication program has the capability to bypass router ACLs that
block incoming SYN traffic on port 80? ✅ACKCMD uses TCP ACK packets to bypass
ACLs that block incoming SYN packets.

What does the command nc -n -v -l -p 25 accomplish? ✅Nc -n -v -l -p 25 opens a
listener on TCP port 25 on the local computer.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller twishfrancis. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81531 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.99
  • (0)
  Add to cart