Ransom

 

ITS 4550 - Internet and Web Security

Review for First Test

The following questions are provided to help you study for the first test. Do not expect to see these exact questions on the test.


  1. What is the difference between wardialing and wardriving?

  2. What is the difference between symmetric and asymmetric encryption?

  3. How can you mitigate the threat of an SQL injection?

  4. What feature in NTFS allows you to hide a file in an attribute of another file?

  5. Compare encryption and hashing. How are they essentially different?

  6. Why do penetration testers need to have a contract with the entity they are trying to hack?

  7. What should we have learned about trustworthy encryption protocols, such as MD5, DES, and WEP?

  8. What is router latency, and why is it necessary?

  9. What information is typically returned by a port scanner? How does this help an attacker?

  10. What are the three steps in a typical SYN sequence? What happens in a SYN attack instead?

  11. What does it mean for a firewall to work in an implicit deny mode? How does that help defend a network?

  12. How does Public Key Cryptography work?

  13. What are some things you expect to find in a Digital Certificate that complies with the X.509 standard?

  14. Microsoft was proud of the autorun feature when they rolled it out. Why should we now consider it to be a bad idea?

  15. Name some aspects of physical security that can be applied in a layered model.

  16. What is footprinting? When is it probably more useful in an attack strategy?

  17. What are some sources that should be used in footprinting a target?

  18. How do you tell Nmap to report a target's operating system? Why do we care?

  19. Where should I look for the Security Account Manager file in Windows?

  20. What did we decide in class about the three kinds of numbers that may appear at the end of a Security Identifier (SID)?

  21. What is a title of a person who legally tests networks for vulnerabilities?

  22. What is the first rule in the "Code of Conduct" as described by the book?

  23. Which protocol is used to ping another system and what layer of the OSI model is it located on?

  24. What is the most ancient cipher discussed in the book?

  25. Name a behavioral recognition that the notes discuss can be used as a type of biometric measurement?

  26. What are some tools the book recommends to use for wardriving?

  27. What are some of the major elements of pen testing?

  28. What are three common methods for data removal/preparing data storage devices for disposal?

  29. What TCP flags are typically used to request that a sesstion be opened and closed?

  30. What is the most recent WPA standard? Are there devices that support it?

  31. With regard to scanning ID badges, what is the measure that compares the number of false acceptances and the number of false rejections?

  32. What kind of malware does the following?
    • adds a destructive function to a part of a standard program
    • starts an attack on a system at a predetermined date and/or time
    • encrypts a system and requests payment to a hacker
    • takes over the operating system in order to perform evil that the user may not notice

  33. What protocols are used to determine one kind of address from another known kind of address?

  34. What is the essence of a DoS attack? Why would an attacker prefer to stage a DDoS attack?

  35. What are some of the categories that hackers fall into, according to the first chapter in our text?

  36. How is a penetration tester different from the discussed types of hackers?

  37. What is the difference between forensics and antiforensics?

  38. What is the value of the Internet Archive?

  39. What do data wiping, zeroization, and degaussing actually do?