Online Book Reader

Home Category

CEH_ Official Certified Ethical Hacker Review Guide_ Exam 312-50 - Kimberly Graves [80]

By Root 334 0
systems from the Internet

D. Physical access

4. Which of the following is often one of the most overlooked areas of security?

A. Operational

B. Technical

C. Internet

D. Physical

5. A hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside the building is causing what type of security breach?

A. Physical

B. Technical

C. Operational

D. Remote access

6. Which area of security usually receives the least amount of attention during a penetration test?

A. Technical

B. Physical

C. Operational

D. Wireless

7. Which of the following attacks can be perpetrated by a hacker against an organization with weak physical security controls?

A. Denial of service

B. Radio frequency jamming

C. Hardware keylogger

D. Banner grabbing

8. Which type of access allows passwords stored on a local system to be cracked?

A. Physical

B. Technical

C. Remote

D. Dial-in

9. Which of the following is an example of a physical security breach?

A. Capturing a credit card number from a web server application

B. Hacking a SQL server in order to locate a credit card number

C. Stealing a laptop to acquire credit card numbers

D. Sniffing a credit card number from packets sent on a wireless hotspot

10. What type of attack can be performed once a hacker has physical access?

A. Finding passwords by dumpster diving

B. Stealing equipment

C. Performing a DoS attack

D. Session hijacking

Answers to Review Questions

1. A, B, C, D. The chief information officer, along with all the employees, is responsible for implementing physical security.

2. B. A fire or flood are factors that can affect physical security while all the others are technical security issues.

3. A, B, D. Physical security is designed to prevent stealing of confidential data, hacking systems from the inside, and physical access restricted to authorized personnel. Technical security defends against hacking systems from the Internet.

4. D. Physical security is one of the most overlooked areas of security.

5. A. In order to place a wireless access point, a hacker needs to have physical access.

6. B. Physical security usually receives the least amount of testing during a penetration test.

7. C. A hardware keylogger can be installed to capture passwords or other confidential data once a hacker gains physical access to a client system.

8. A. Physical access allows a hacker to crack passwords on a local system.

9. C. Theft of equipment is an example of a physical security breach.

10. B. Stealing equipment requires physical access.

Linux Hacking

CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:

✓ Linux Basics

✓ Understand How to Compile a Linux Kernel

✓ Understand GCC Compilation Commands

✓ Understand How to Install Linux Kernel Modules

✓ Understand Linux Hardening Methods

Linux is a popular operating system with systems administrators because of its open source code and its flexibility, which allows anyone to modify it. Because of the open source nature of Linux, there are many different versions, known as distributions (or distros). Several of the Linux distributions have become robust commercial operating systems for use on workstations as well as servers. Popular commercial distributions include Red Hat, Debian, Mandrake, and SUSE; some of the most common free versions are Gentoo and Knoppix.

Linux's flexibility and cost, together with the increase in Linux applications, have made it the operating system of choice for many systems. Although Linux has inherently tighter security than Windows operating systems, it also has vulnerabilities that can be exploited. This chapter covers the basics of getting started using Linux as an operating system and knowing how to harden the system to attacks.

Linux Basics

Linux is loosely based on UNIX and anyone familiar working in a UNIX environment should be able to use a Linux system. All standard commands and utilities are included on most distros.

Many text editors are available inside a Linux system, including vi, ex, pico, jove, and GNU

Return Main Page Previous Page Next Page

®Online Book Reader