Cryptography
Viruses
Penetration Testing
Sniffing
SQL Injection
100
A secure replacement for telnet.
What is SSH?
100
This type of virus stores code in empty space within a file without changing the file's size.
What is Cavity Virus?
100
This activity scans a network for known security weaknesses, such as weak passwords, misconfigurations, and items on the CVE list.
What is Vulnerability Asessment?
100
This works by sending many broadcast DHCP requests with spoofed MAC addresses. This exhausts the DHCP address space, so the attacker can trick clients into using a rogue DHCP server instead.
What is DHCP Starvation?
100
This is used to create, maintain, and manipulate databases.
What is SQL?
200
Government Access to Keys, also known as this, gives the government a decryption key so that they can wiretap encrypted communications.
What is Key Escrow
200
This type of virus changes its code each time it infects a system in order to confuse antivirus software.
What is Polymorphic?
200
This type of activity exploits vulnerabilities to compromise a computer or network, and may use both technological and non-technological means such as social engineering.
What is Penetration Testing?
200
This attack uses many ARP packets with random MAC addresses. This can overload some switches and cause them to fail to "forwarding mode" and act like hubs.
What is MAC flooding?
200
Use this character input to see if a form is vulnerable to SQL injection.
What is the single-quote (')?
300
Diffie-Hellman (key exchange only), RSA, ECC, Elgamal.
What are asymmetric encryption algorithms?
300
This is a small destructive program that runs hidden on an infected computer.
What is Trojan?
300
Nessus and Retina
What are vulnerability scanners?
300
This type of sniffing is sniffing through a hub--collecting data without sending any data.
What is Passive Sniffing?
300
This HTML method places data in the body of a message, which does not appear in the address bar of the browser.
What is POST?
400
MD5, SHA-1, SHA-2
What are common hashing algorithms?
400
These spread through email or other networking connections, don't attach to files, and are more easily removed.
What is Worms?
400
Which phase of a penetration test probes a system, typically with port scanners.
What is active reconnaissance?
400
This type of sniffing occurs through a switch. It involves sending data onto the wire, such as MAC flooding or ARP spoofing, and is easily detected.
What is Active Sniffing?
400
This input is used to get past a logon form.
What is ' or 1=1-- ?
500
This protocol is used for transmitting private documents via the Internet.
What is SSL?
500
This virus infects only occasionally (e.g. every tenth program executed).
What is Sparse Infector Virus?
500
Collecting information without the target knowing it. This phase of penetration testing includes physical observation, dumpster diving, eavesdropping on employee conversations, searching the Web, posing as an employee, and packet sniffing.
What is passive reconnaissance?
500
This is the best countermeasure for sniffing.
What is encryption?
500
This SQL stored procedure is used to execute operating system commands.
What is master..xp_cmdshell?
M
e
n
u