IT CertificationsComprehensive Study Set

Boson Ceh

442 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Blackboard architecture

ANSWER

a design in which a database or knowledgebase is established to solve a particular problem, it is typically updated by various sources

QUESTION 2

Service-oriented architecture (SOA)

ANSWER

A software design in which software components deliver information to other components over a network Example: API to give developers access to a database

QUESTION 3

client/server architecture

ANSWER

A network design in which client computers use a centrally administered server to share data, data storage space, and devices. Example: Server that delivers web pages to a browser

QUESTION 4

Monolithic Architecture

ANSWER

A design in which a single application is developed to handle components that have functional differences Example: A single application that has both the UI and code to access data.

QUESTION 5

Which type of malware often needs kernel-level privileges to function?

ANSWER

Rootkit

QUESTION 6

Bayesian System

ANSWER

????

QUESTION 7

What is a hash collision?

ANSWER

When a hashing algorithm creates the same hash from different plain text values.

QUESTION 8

How many bits does MD5's hash have?

ANSWER

128 bit hashes

QUESTION 9

What is data collision?

ANSWER

When two devices transmit at the same time

QUESTION 10

False positive generation

ANSWER

A technique that generates a large amount of alert traffic to prevent detection of a legit attack by an IDS

QUESTION 11

What is session splicing?

ANSWER

An attack that uses fragmentation to avoid an IDS. It breaks session data up to pass it to a host. This way the IDS doesn't see all the attack data at once and may think the data is unrelated Only works on session-based protocols like HTTP

QUESTION 12

What is IP Address Spoofing?

ANSWER

Changing or disguising the source IP address of an IP packet. Useful to mask the source of a DDoS attack

QUESTION 13

What is Source Routing?

ANSWER

Sender defines some or all hops a packet must travel through. Enable by enabling loose source routing or strict source routing and providing all IPs to use

QUESTION 14

What port does telnet use?

ANSWER

TCP Port 23

QUESTION 15

What port does SMTP use?

ANSWER

TCP PORT 25

QUESTION 16

What port does DNS use? (DNR)

ANSWER

TCP/UDP Port 53

QUESTION 17

What does DNS stand for?

ANSWER

It Means Domain Name System

QUESTION 18

What does DNS do?

ANSWER

It translates web addresses that people use into addresses the Internet uses

QUESTION 19

What are the 7 categories of controls?

ANSWER

Directive - Company Policy Deterrent - Firing someone for failing it Preventative - Firewall blocking it Compensating - Extra policy on a policy Detective - IDS Corrective - antivirus correcting issues Recovery - antivirus

QUESTION 20

What does IEEE stand for?

ANSWER

Institute of Electrical and Electronics Engineers

QUESTION 21

What does 802.1x define to establish port-based NAC?

ANSWER

Extensible Authentication Protocol (EAP)

QUESTION 22

What does NAC stand for?

ANSWER

It stands for Network Access Control

QUESTION 23

What does AES stand for?

ANSWER

It stands for Advanced Encryption Standard

QUESTION 24

What doe AES do?

ANSWER

It is a cryptographic algorithm used in WPA2. After 802.1X is authenticated AES can encrypt communication

QUESTION 25

What does IPSec mean?

ANSWER

IP Security

QUESTION 26

What is IPsec used for?

ANSWER

Provides security for VPNs

QUESTION 27

What parts of the triad does IPSec provide?

ANSWER

Confidentiality - Encrypts before sending Integrity - encryption says if it was tampered with

QUESTION 28

What does L2TP stand for?

ANSWER

Layer 2 Tunneling Protocol

QUESTION 29

What is L2TP used for?

ANSWER

Used to establish VPN Connections

QUESTION 30

What happens to packets with L2TP?

ANSWER

They are encapsulated in UDP packets

QUESTION 31

What does NIST stand for?

ANSWER

National Institute of Standards and Technology

QUESTION 32

What does NIST 800-53 do?

ANSWER

Catalogs security and privace controls for federal information systems except those related to Directive Deterrent Preventative Compensating Detective Corrective Recovery NATIONAL SECURITY

QUESTION 33

What does FISMA stand for?

ANSWER

Federal Information Security Management Act of 2002

QUESTION 34

What does FISMA do?

ANSWER

Requires all federal agencies to have an Info Sec program It also assigns responsibilities to Office of Management and Budget and NIST

QUESTION 35

What does FITARA stand for?

ANSWER

Federal Information Technology Acquisition Reform Act (2013)

QUESTION 36

What does FITARA do?

ANSWER

Provides a framework for US Govt purchases. Was aimed to reduce spending on old systems This act failed

QUESTION 37

What does HIPAA stand for?

ANSWER

Health Insurance Portability and Accountability Act

QUESTION 38

What is Libwhisker?

ANSWER

Pearl module that supports IDS evasion Nikto uses libwhisker

QUESTION 39

What is Nikto?

ANSWER

A General Public License(GPL) web vulnerability scanner that performs multiple checks. Relies on Libwhisker Supports SSL Supports HTTP Supports reporting

QUESTION 40

What is Burp Suite?

ANSWER

a suite of tools for attacking web applications. Has free and professional versions

QUESTION 41

What is Nessus?

ANSWER

A proprietary commercial vulnerability scanner. Patch levels Vul of known exploits Has plugins

QUESTION 42

What are the common DH Groups?

ANSWER

1, 2, 5, 14, 15,16, 17,18

QUESTION 43

What are the common DH Groups' Modulus sizes?

ANSWER

1 - 768 bit - smallest 2 - 1024 bit - 2 GB 5 - 1536 bit - only with 5 in it 14 - 2048 bit 15 - 3073 bit - 15x2 = 30 16 - 4096 bit 17 - 6144 bit - Matt 17-44 18 - 8192 - Dylan #81 92

QUESTION 44

What does DH stand for?

ANSWER

Diffie-Hellman an Asymmetric encryption protocol

QUESTION 45

What is Diffie-Hellman? (hyphen)

ANSWER

An asymmetric encryption protocol that is used to exchange security keys between two parties who have had no previous communication

QUESTION 46

What is Pcap?

ANSWER

A packet capture library that is used by many packet sniffers and network monitors

QUESTION 47

What is Pcap used by

ANSWER

It is used by the following: Kismet L0phtCrack Nmap Ngrep Snort Tcpdump Wireshark

QUESTION 48

Who created pcap?

ANSWER

It was created by the developers of Tcpdump

QUESTION 49

What is Tcpdump?

ANSWER

the premier network analysis tool for information security professionals. Having a solid grasp of this über-powerful application is mandatory for anyone desiring a thorough understanding of TCP/IP.

QUESTION 50

What is Libpcap?

ANSWER

a C/C++ version of fpcap used in UNIX systems

QUESTION 51

What is Winpcap?

ANSWER

Windows based version of libpcap

QUESTION 52

What is john the ripper?

ANSWER

a password cracking tool

QUESTION 53

What is cain & abel?

ANSWER

A password cracking tool

QUESTION 54

What is Kerbcrack?

ANSWER

a password cracking tool

QUESTION 55

What is L0phtCrack?

ANSWER

As password cracking tool

QUESTION 56

What is THC-Hydra?

ANSWER

A password cracking tool

QUESTION 57

What is a network tap?

ANSWER

A method of sitting between a network session's source and destination so that traffic can be captured by a sniffer and analyzed

QUESTION 58

What is a back door?

ANSWER

Code or credentials that are built into software that give complete access to the workstation it is running on

QUESTION 59

What is MD5?

ANSWER

A password-hashing algorithm Creates 128bit hash

QUESTION 60

What does LM mean?

ANSWER

Microsoft's LAN Manager

QUESTION 61

What is LM?

ANSWER

a hashing technique that converts a users password into uppercase and then adds blank spaces until the size is 14 bytes. The 14 bytes are split into 2x 7byte chunks then each is ran through DES then the two are put back together Used prior to Windows NT

QUESTION 62

What does DES sta

ANSWER

Data Encryption Standard

QUESTION 63

What is an NT hash?

ANSWER

a 16 byte MD4 hash of a UTF-16 Unicode password?

QUESTION 64

What does MD4 mean?

ANSWER

Message Digest 4

QUESTION 65

What is MD4 susceptible to?

ANSWER

Collision attacks because the hash is so small

QUESTION 66

What does NTLM stand for?

ANSWER

NT LAN Manager

QUESTION 67

What is NTLM?

ANSWER

A protocol that uses both an NT hash and an LM hash to store passwords

QUESTION 68

What does the proxychains command do? What is it used for?

ANSWER

It is used to hide true source IP address of traffic. It is used to evade detection on an IDS

QUESTION 69

What are linux IP filtering commands?

ANSWER

ipfwadmin ipchains iptables

QUESTION 70

What commands can be used for IP masquerading on a linux-based firewall?

ANSWER

ipfwadmin ipchains iptables

QUESTION 71

What is a data owner?

ANSWER

The individual or entity accountable for data

QUESTION 72

What is a data custodian?

ANSWER

The individual or entity that is responsible for granting access to data

QUESTION 73

What does OSSTMM stand for?

ANSWER

Open Source Security Testing Methodology Manual

QUESTION 74

What does OSSTMM do?

ANSWER

Provides protection for operations and can influence the impact of threats

QUESTION 75

How many types of controls are there in OSSTMM?

ANSWER

10

QUESTION 76

What are the two control classes in OSSTMM?

ANSWER

Interactive Process Controls

QUESTION 77

What controls are considered "Class A"in OSSTMM?

ANSWER

Interactive Controls

QUESTION 78

What controls are considered "Class B" in OSSTMM?

ANSWER

Process Controls

QUESTION 79

What are the Class A controls in OSSTMM? (RACISm)

ANSWER

Authentication Indemnification Resilience Subjugation Continuity

QUESTION 80

What are the Class B controls in OSSTMM? (CAtNIP)

ANSWER

Nonrepudiation Confidentiality Privacy Integrity Alarm

QUESTION 81

What is authentication?

ANSWER

Provides for identification and authorization based on credentials

QUESTION 82

What is Indemnification?

ANSWER

provides contractual protection against loss or damages

QUESTION 83

What is resilience?

ANSWER

Protects assets from corruption or failure

QUESTION 84

What is subjugation?

ANSWER

Ensure that interaction occur according to processes defined by the asset owner

QUESTION 85

What is continuity?

ANSWER

Maintains interactivity with assets if corruption of failure occurs

QUESTION 86

What is nonrepudiation?

ANSWER

Prevents a participant from denying its actions

QUESTION 87

What is confidentiality?

ANSWER

Ensures that only participants have knowledge of an asset

QUESTION 88

What is privacy?

ANSWER

Ensures that only participants have access to the asset

QUESTION 89

What is integrity?

ANSWER

Ensures that participants know when assets and processes change

QUESTION 90

What is alarm?

ANSWER

Notifies participants when interactions occur

QUESTION 91

How does OSSTMM define legislative, contractual and standards-based?

ANSWER

As types of compliance

QUESTION 92

What are examples of legislative compliance?

ANSWER

SOX - Sarbanes-Oxley HIPAA - Healthcare Information Portability Accountability

QUESTION 93

What is an example of Contractual compliance?

ANSWER

PCI DSS - Payment Card Industry Data Security Standard

QUESTION 94

What is an example of standards-based compliance?

ANSWER

ITIL - Information Technology Infrastructure Library ISO - International Organization for Standardization

QUESTION 95

What does ISO stand for?

ANSWER

International Organization for Standardization

QUESTION 96

What does PCI DSS stand for?

ANSWER

Payment Card Industry Data Security Standard

QUESTION 97

What does ITIL stand for?

ANSWER

Information Technology Infrastructure Library

QUESTION 98

Who maintains OSSTMM?

ANSWER

ISECOM - Institute of Security and Open Methodologies

QUESTION 99

What does OSSTMM provide?

ANSWER

a repeatable framework for operational security testing and analysis

QUESTION 100

What does the OSSTMM framework test?

ANSWER

Human Physical Wireless Telecomms Network security OSSTMM also has a web-app version

QUESTION 101

What will HTTP PUT do?

ANSWER

Enables HTTP clients to update files to the target system

QUESTION 102

What will HTTP GET do?

ANSWER

Will report whether GET is supported by the target system

QUESTION 103

What will HTTP HEAD do?

ANSWER

Will report whether HEAD is supported by the target system

QUESTION 104

What will HTTP POST do?

ANSWER

Will report whether POST is supported by the target system

QUESTION 105

What will HTTP OPTIONS do?

ANSWER

Will report whether OPTIONS is supported on the target system

QUESTION 106

What does xp_cmdshell stored procedure allow for?

ANSWER

It allows for execution of arbitrary calls with the permission of either the SQL Server or proxy account

QUESTION 107

Who should have access to xp_cmdshell stored procedure?

ANSWER

sysadmin should be the only one with this access

QUESTION 108

What should you do with guest accounts to meet SQL Server best practices?

ANSWER

Disable guest accounts

QUESTION 109

What should you do with cross data base ownership chaining to meet SQL Server best practices?

ANSWER

disable it

QUESTION 110

What permission is "public database role" granted on SQL Server by default?

ANSWER

None

QUESTION 111

What does IDS stand for?

ANSWER

Intrusion Detection System

QUESTION 112

What does a port scanner do?

ANSWER

Scan an IP address range to determine open and close ports

QUESTION 113

What does a network sniffer do?

ANSWER

captures network data as it passes through the network interface

QUESTION 114

Is a network sniffer passive or active?

ANSWER

Passive

QUESTION 115

What mode on a NIC is required to capture network data?

ANSWER

promiscuous mode

QUESTION 116

What does an IDS do?

ANSWER

Can monitor network traffic and examine the traffice for signatures. When it finds a signature it notifies the admin

QUESTION 117

What is the name of this pane in Wireshark?

ANSWER

Packet Details Pane

QUESTION 118

What information does the Packet List pane display?

ANSWER

Packet Number Timestamp Source Destination Protocol Length Additional Info

QUESTION 119

What information does the Packet Details pane list?

ANSWER

Shows the protocols and protocol fields in the packet. Displayed in tree format that can be expanded or collapsed

QUESTION 120

What information does the Packet Bytes pane show?

ANSWER

Contains hexadecimal characters and data offset (line number)

QUESTION 121

What does -n in NMAP do?

ANSWER

Disables DNS resolution

QUESTION 122

What does -R in NMAP do?

ANSWER

Enables DNS resolution

QUESTION 123

What does -P0 in NMAP do?

ANSWER

Disables ICMP (older parameters)

QUESTION 124

What does ICMP stand for?

ANSWER

Internet Control Message Protocol

QUESTION 125

What does -PN in Nmap do?

ANSWER

Disables ICMP (older parameters)

QUESTION 126

What does -Pn do in NMAP?

ANSWER

Disables DNS

QUESTION 127

When would you want to disable ICMP pings?

ANSWER

Do this when performing stealth scans to avoid detection

QUESTION 128

What does the -T parameter in NMAP do?

ANSWER

Configures timing options. Is followed by a number 1-5 (1 is safest and 5 is worst)

QUESTION 129

What does -T0 do in NMAP?

ANSWER

Sets scan frequencey to "Paranoid scan"

QUESTION 130

How long does -T0 wait to between each packet?

ANSWER

Waits 5 minutes between each packet

QUESTION 131

What does -T1 do in NMAP

ANSWER

Sets scan frequency to "Sneaky Scan"

QUESTION 132

What is the scan frequency of -T1 in NMAP

ANSWER

15 second pause between each packet

QUESTION 133

What is the scan frequency of -T2 in NMAP

ANSWER

10 second pause between each packet

QUESTION 134

What is the scan frequency of -T3 in NMAP

ANSWER

10 second pause between each packet

QUESTION 135

What is the scan frequency of -T4 in NMAP

ANSWER

1.25 second pause between each packet

QUESTION 136

What is the scan frequency of -T5 in NMAP

ANSWER

.3 second pause between each packet

QUESTION 137

What is -T2 called in Nmap

ANSWER

It is called Polite Scan in NMAP

QUESTION 138

What is -T3 called in Nmap

ANSWER

It is called normal scan in NMap

QUESTION 139

What is -T4 called in Nmap

ANSWER

It is called aggressive scan in Nmap

QUESTION 140

What is -T5 called in Nmap

ANSWER

It is called Insane Scan in Nmap

QUESTION 141

What does -sS do in nmap?

ANSWER

It performs a stealth scan in Nmap

QUESTION 142

What are 2 other names for stealth scan?

ANSWER

SYN scan Half-open scan

QUESTION 143

What will a target return for an open port in a stealth scan?

ANSWER

SYN/ACK is returned by the target

QUESTION 144

What will the target return for a closed port in a stealth scan?

ANSWER

RST/ACK

QUESTION 145

What does the ATTACKING system do when an open port replies during a stealth scan?

ANSWER

It sends an RST response to reset the connection

QUESTION 146

What does APT mean?

ANSWER

Advanced Persistent Threat

QUESTION 147

What does APT involve?

ANSWER

The installation of a back door

QUESTION 148

What are the 3 parts of an APT attack?

ANSWER

Advanced - the techniques that are used Persistent - Remote/permanent control of the system Threat - non-technical, human

QUESTION 149

What are the 4 phases of a penetration test? (P-DeAR)

ANSWER

Planning Discovery Attack Reporting

QUESTION 150

What will a project scope document?

ANSWER

Expected results of the project Constraints Any conditions

QUESTION 151

During a penetration test when would you recommend mitigation of issues?

ANSWER

During the reporting phase

QUESTION 152

What does IPSec protect against?

ANSWER

MitM Session Replay Data Manipulation

QUESTION 153

How does IPSec provide data authentication?

ANSWER

Username/Password preshared keys Digital certificates one-time passwords

QUESTION 154

How does IPSec provide data integrity?

ANSWER

It verifies the checksums at each end of the connection

QUESTION 155

What layer does IPSec operate at on the OSI model?

ANSWER

Network Layer (Layer 3)

QUESTION 156

What are the OSI Model Layers?

ANSWER

Physical, - computer Data Link, Network, Transport, Session, Presentation, Application

QUESTION 157

What does PPTP stand for?

ANSWER

Point-to-Point Tunneling Protocol

QUESTION 158

What is PPTP used for?

ANSWER

Transferring data across IP-based VPN connections

QUESTION 159

What OSI layer does PPTP operate at?

ANSWER

Data Link Layer (Layer 2)

QUESTION 160

What does PPTP use for data transfer security?

ANSWER

Extensible Authentication Protocol (EAP)

QUESTION 161

What does EAP stand for

ANSWER

Extensible Authentication Protocol

QUESTION 162

What is L2PT used for?

ANSWER

transferring data across a VPN

QUESTION 163

How is security for a VPN connection handled in L2PT?

ANSWER

It can use IPSec for VPN connections since it doesn't provide security itself

QUESTION 164

What OSI layer does L2PT operate at?

ANSWER

Operates at the Data Link layer (Layer 2)

QUESTION 165

What does GRE stand for?

ANSWER

Generic Routing Encapsulation

QUESTION 166

What OSI layer does GRE operate at?

ANSWER

Network Layer (Layer 3)

QUESTION 167

What is GRE used for?

ANSWER

Encapsulates and forwards non-IP protocols such as the below across an IP network. IPX - Internetwork Packet Exchange AppleTalk Uses IPSec to provide encryption and authentication

QUESTION 168

What RID value indicates the account is an administrator?

ANSWER

RID 500

QUESTION 169

What RID value indicates the account is a guest account

ANSWER

RID 501

QUESTION 170

Where do RIDs start to indicate an account is a user account?

ANSWER

RID 1000+

QUESTION 171

What does SID stand for?

ANSWER

Security Identifier

QUESTION 172

What does the first component of an SID mean?

ANSWER

That the string is an SID

QUESTION 173

What does the second component of an SID mean?

ANSWER

The revision onumber of the SID

QUESTION 174

What does the third component of an SID mean?

ANSWER

a 5 indicates this is an SID for Windows NT authority

QUESTION 175

What does the fourth component of an SID mean?

ANSWER

the domain or local computer identifier of the SID

QUESTION 176

What does the fifth component of an SID mean?

ANSWER

This is the relative identified (RID) and identifies the type of user the SID is for

QUESTION 177

What is a sparse infector virus?

ANSWER

A virus that infect files only when a specific condition is met They execute less frequently to avoid antivirus software

QUESTION 178

What is a cavity virus?

ANSWER

a virus that overwrites portions of a file, filling the unused areas. This results in an infected file that is the same size as the original

QUESTION 179

What is a metamorphic virus?

ANSWER

A virus that rewrites itself each time it infects a new file

QUESTION 180

What is a stealth virus?

ANSWER

A virus that stays hidden by monitoring service calls to the OS. If a call is made to an infected file the original file's attributes are returned to the OS

QUESTION 181

What is the maximum length of an LM password?

ANSWER

14 characters is the maximum length

QUESTION 182

How long are all LM passwords?

ANSWER

14 characters. Anything shorter than 14 characters is filled in with blanks

QUESTION 183

How can you tell if an LM password is 7 of less characters?

ANSWER

The second part of the hash is: AAD3B435B51404EE 404 Page Not FOUND

QUESTION 184

What language does G++ compile?

ANSWER

Compiles C++

QUESTION 185

What language has an extension of ".cpp"

ANSWER

C++ extension

QUESTION 186

What language has an extension of ".js"

ANSWER

Javascript extension

QUESTION 187

What language has an extension of ".pl"

ANSWER

Pearl extension

QUESTION 188

What language has an extension of ".py"

ANSWER

Python extension

QUESTION 189

What does -o do in a g++ command?

ANSWER

defines an output executable g++ gotcha.cpp -o clickme.exe compiles gotcha.cpp into clickme.exe

QUESTION 190

What are some popular C++ file extensions?

ANSWER

.C .cc .cpp .CPP .c++ .cp .cxx .hh .hpp .H .ii .tcc

QUESTION 191

What mechanism can session splicing exploit to evade an IDS

ANSWER

data fragmentation can be used in this to evade an IDS

QUESTION 192

What is a buffer overflow attack?

ANSWER

Putting more data in a buffer than it can hold which allows an attacker to execute malicious code on the computer

QUESTION 193

What is C++ particularly vulnerable to?

ANSWER

It is particularly vulnerable to overflow attacks

QUESTION 194

What is IP checksum validation?

ANSWER

Used to provide limited amount of data integrity for IP datagrams. When a host receives an IP datagram it calculates the checksum of the header and compares it to the value of the header's checksum. If they don't match it is discarded

QUESTION 195

What does NAT stand for?

ANSWER

Network Address Translation

QUESTION 196

What does NAT do?

ANSWER

translates Private IP addresses to Public IP addresses and Public IP addresses back to Private IP addresses. is a many-to-many mapping

QUESTION 197

What does Dynamic NAT do?

ANSWER

Maintains a pool of public IP addresses and assigns them to devices with a private IP address on an as-needed basis. As communication sessions close the public IPs are put back in the pool for use

QUESTION 198

What is static NAT?

ANSWER

a one-to-one mapping between private IPs and public IPs

QUESTION 199

What does PAT stand for?

ANSWER

Port Address Translation Many-to-one mapping

QUESTION 200

How often does TCPView update by default?

ANSWER

Updates every second by default

QUESTION 201

How do you modify refresh rates for TCPView?

ANSWER

Selcting VIEW->UPATE SPEED

QUESTION 202

What are the possible refresh reates for TCPView?

ANSWER

1 second 2 seconds 5 seconds Paused

QUESTION 203

What is TCPView?

ANSWER

a host-based tool that displays Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) connections between the host and destination devices

QUESTION 204

What information does TCPView display?

ANSWER

It displays Process ID Protocol Local and remote address Local and remote port Connection state number of sent and received packets number of sent and received bytes Devices can be displayed by host name or by ip address

QUESTION 205

What OS does TCPView operate on?

ANSWER

It only operates on Windows

QUESTION 206

What OS does Netstat operate on?

ANSWER

It operates on Windows, Linux and UNIX systems

QUESTION 207

What is a TCPView alternative with command-line functionality?

ANSWER

Tcpvcon is a command-line alternative

QUESTION 208

What does tcpvcon -a do?

ANSWER

Runs tcpvcon and displays all end points

QUESTION 209

What does tcpvcon -c do?

ANSWER

prints the output of tcpvcon as a comma-separated CSV

QUESTION 210

What does tcpvcon -n do?

ANSWER

configures tcpvcon to not resolve addresses

QUESTION 211

What protocol is a Fraggle attack specific to?

ANSWER

This attack is specific to UDP

QUESTION 212

What is a fraggle attack?

ANSWER

This attack is a denial-of-service (DoS) attack that involves sending a large amount of spoofed UDP traffic to a router's broadcast address within a network. It is very similar to a different attack which uses spoofed ICMP traffic rather than UDP traffic to achieve the same goal.

QUESTION 213

What protocol is a Sequence Prediction attack specific to?

ANSWER

TCP

QUESTION 214

What is a sequence prediction attack?

ANSWER

When an attacker can guess the next sequence number from the legit sender to a host.

QUESTION 215

What is a smurf attack?

ANSWER

An attack that uses ICMP Echo Requests with a spoofed source address to a broadcast address. All that receive the request ping back but is directed to the DoS target

QUESTION 216

What does a multipartite virus do?

ANSWER

A virus that attempts to infect the boot sector and various files and programs

QUESTION 217

What does a macro virus do?

ANSWER

A virus that infects MS templates by using on-board VBA to run commands

QUESTION 218

What does the DROP command do in SQL?

ANSWER

Deletes a table EX DROP TABLE customer_table

QUESTION 219

What does the EXEC command do in SQL?

ANSWER

Executes a command string on a database

QUESTION 220

What does the UPDATE command do in SQL?

ANSWER

Allows you to update values in a SQL database

QUESTION 221

What does GLBA stand for?

ANSWER

Gramm-Leach-Bliley Act

QUESTION 222

What does GLBA do?

ANSWER

Protects the confidentiality and integrity of personal information that a financial institution collects. Also requires the institution to disclose their privacy practices to the customer

QUESTION 223

What does TCSEC stand for?

ANSWER

Trusted Computer System Evaluation Criteria AKA Orange Book

QUESTION 224

What does TCSEC do?

ANSWER

Provides guidance on evaluating the effectiveness of computer security controls

QUESTION 225

What are the 4 divisions of security included in TCSEC

ANSWER

A - verified protection B - Mandatory protection C - Discretionary Protection D - Minimal protection

QUESTION 226

What does the 'net user' command do?

ANSWER

Allows you to manage user accounts on a Windows command prompt

QUESTION 227

What does the 'net start' command do?

ANSWER

This command starts a service on a Windows command prompt

QUESTION 228

What does the 'net pause' command do?

ANSWER

This command pauses a service on a Windows command prompt

QUESTION 229

What does the 'net use' command do?

ANSWER

This command connects to a remote resource on a Windows command prompt

QUESTION 230

What does the 'net' command do?

ANSWER

This command allows you to manage different aspects of services on a windows command prompt

QUESTION 231

What does the -I flag do in Netcat?

ANSWER

This flag configures Netcat to accept inbound connections on a UNIX host

QUESTION 232

What does the -L flag do in Netcat?

ANSWER

This command configures Netcat to listen for inbound connections and restart after a session terminates. Only available in Windows

QUESTION 233

What does the -p flag do in Netcat?

ANSWER

This flag specifies a TCP port in Netcat

QUESTION 234

What does the -e flag do in Netcat?

ANSWER

This flag specifies the program to run when a session is established in Netcat

QUESTION 235

What does the -u flag do in Netcat?

ANSWER

This Netcat flag specifies a UDP Port

QUESTION 236

What layer do application-level firewalls operate at in the OSI model?

ANSWER

Operate at Layer 7 (Application Layer)

QUESTION 237

What layer do circuit-level firewalls operate at in the OSI model?

ANSWER

Operate at Layer 5, Session Layer

QUESTION 238

What layer do packet-filtering firewalls operate at in the OSI model?

ANSWER

Operate at Layer 3 Network Layer

QUESTION 239

What OSI layer do Stateful multilayer inspection firewalls operate at?

ANSWER

Multiple OSI layers They combine Packet-filtering circuite-level application-level techniques

QUESTION 240

What does ESP stand for?

ANSWER

Encapsulating Security Payload

QUESTION 241

What does ESP do in IPSec in tunnel mode?

ANSWER

It encrypts the entire IP packet in IPSec when in tunnel mode

QUESTION 242

In IPSec transport mode what is encrypted by ESP?

ANSWER

Only the IP payload is encrypted by ESP in this mode

QUESTION 243

What does AH stand for?

ANSWER

Authentication Header

QUESTION 244

What does AH provide?

ANSWER

Authentication and Integrity is provided

QUESTION 245

Does AH encrypt data?

ANSWER

No, AH doesn't encrypt data

QUESTION 246

What are the steps to create an encrypted message that contains a digital signature using PKI technology?

ANSWER

Create a hash of the message Encrypt the hash using your private key Encrypt the message with the recipients public key

QUESTION 247

What are the three types of authentication?

ANSWER

Something you have Something you know Something you are

QUESTION 248

What is steganography?

ANSWER

a cryptography method in which data is hidden in another media type

QUESTION 249

What is an overt channel?

ANSWER

A transmission that is authorized and is performed in compliance with security policies

QUESTION 250

What is a covert channel?

ANSWER

A transmission that violates a company's security policy. Often used to mask transmissions

QUESTION 251

What does MTD stand for?

ANSWER

Maximum Tolerable Downtime

QUESTION 252

What does DRP stand for?

ANSWER

Disaster recovery plan

QUESTION 253

What does IRC stand for?

ANSWER

Internet Relay Chat

QUESTION 254

What technology is most commonly associated with botnets?

ANSWER

IRC Is most common

QUESTION 255

What is the BCP Development process?

ANSWER

Develop BCP Policy Conduct BIA Identify controls Develop recovery strats Develop an IT DRP Perform DRP training Perform BC/DR maintenance

QUESTION 256

How long should policies be?

ANSWER

As short as possible

QUESTION 257

How specific should security policies be?

ANSWER

Not specific

QUESTION 258

What type of document should have "must" and "will" statements?

ANSWER

Policies have these words

QUESTION 259

Who should endorse policies?

ANSWER

Senior Management should endorse them or they'll fail

QUESTION 260

What type of document has words like "should" and "may?"

ANSWER

Guidelines have these types of words

QUESTION 261

What does SMB stand for?

ANSWER

Server Message Block

QUESTION 262

What is SMB used for?

ANSWER

Enables file and printer sharing without the need for NetBIOS port broadcasting

QUESTION 263

What port does POP3 use?

ANSWER

TCP Port 110

QUESTION 264

What does POP3 mean?

ANSWER

Post Office Protocol v3

QUESTION 265

What port does BGP use?

ANSWER

TCP port 179

QUESTION 266

What does BGP stand for?

ANSWER

Border Gateway Protocol

QUESTION 267

What does BGP do?

ANSWER

It is an exterior gateway protocol that can be used to exchange routing info between network providers

QUESTION 268

What does POP3 do?

ANSWER

It is used by mail clients to retrieve email from a remote server

QUESTION 269

What does SNMP stand for?

ANSWER

Simple Network Management Protocol

QUESTION 270

What does SNMP do?

ANSWER

It is used to monitor and manage network devices

QUESTION 271

What port does SMB use?

ANSWER

TCP/UDP Port 445

QUESTION 272

What port does NetBIOS use?

ANSWER

TCP Port 139

QUESTION 273

What layer does HTTP operate at?

ANSWER

Application Layer (Layer 7)

QUESTION 274

What layer do packet sniffers operate at?

ANSWER

Layer 2 (Network layer)

QUESTION 275

What does STP stand for?

ANSWER

Spanning Tree Protocol

QUESTION 276

What layer does STP operate at?

ANSWER

Layer 2 (data link)

QUESTION 277

What layer does TCP operate at?

ANSWER

Layer 4 (Transport)

QUESTION 278

What does SOCKS mean?

ANSWER

Secure Sockets

QUESTION 279

What layer does SOCKS operate on?

ANSWER

Layer 5 (session)

QUESTION 280

What does a hybrid attack do?

ANSWER

It uses a list of words (like dictionary) but substitutes numbers and symbols for some characters

QUESTION 281

What does a dictionary attack do?

ANSWER

It used a list of words from a "dictionary" to attack

QUESTION 282

What does a single quote (') mean in SQL?

ANSWER

It denotes a character string in SQL

QUESTION 283

What does two hyphens (--) mean in SQL?

ANSWER

Denotes a commend in SQL

QUESTION 284

What does the plus (+) mean in SQL?

ANSWER

It can concatenate two strings together

QUESTION 285

What does the at sign (@) mean in SQL?

ANSWER

Denotes a variable in SQL

QUESTION 286

What does the L parameter do for grep?

ANSWER

Searches for files that DO NOT contain the search term at the beginning of the name in grep

QUESTION 287

what does the e parameter do in grep?

ANSWER

It configures grep to accept a regular expression pattern as a search term

QUESTION 288

What does the ^ parameter do in grep?

ANSWER

It configures grep to match only the beginning of the line to the search term

QUESTION 289

What is a false positive?

ANSWER

When something that shouldn't trigger an alert does

QUESTION 290

What is a false negative?

ANSWER

When something that should trigger an alert doesn't

QUESTION 291

What port does DNS use?

ANSWER

TCP/UDP 53

QUESTION 292

When should you use a proxy server?

ANSWER

You should use this when you want to filter internet traffic for internal hosts on the network

QUESTION 293

When should you use a web server?

ANSWER

You should use this when you want to allow customers to access your website

QUESTION 294

What does DHCP stand for?

ANSWER

Dynamic Host Configuration Protocol

QUESTION 295

What should you use if you want to provide IP addresses to a client's computer?

ANSWER

You should use DHCP for this

QUESTION 296

What should you use to detect unauthorized access to a network?

ANSWER

an IDS

QUESTION 297

What does cryptography provide?

ANSWER

confidentiality, integrity, authentication, & Non-repudiation

QUESTION 298

What does ALE stand for?

ANSWER

Annualized Loss Expectancy

QUESTION 299

How do you calculate ALE?

ANSWER

ALE = SLE x ARO

QUESTION 300

What does ARO stand for?

ANSWER

Annualized Rate of Occurrence

QUESTION 301

What does SLE stand for?

ANSWER

Single Loss Expectancy

QUESTION 302

What does NTP stand for?

ANSWER

Network Time Protocol

QUESTION 303

What port does NTP use?

ANSWER

UDP Port 123

QUESTION 304

What does FTP stand for?

ANSWER

File Transfer Protocol

QUESTION 305

What port does FTP use?

ANSWER

TCP Ports 20, 21

QUESTION 306

What port does SNMP use?

ANSWER

UDP Port 161 and 162

QUESTION 307

What does IPP stand for?

ANSWER

Internet Printing Protocol

QUESTION 308

What port does IPP use?

ANSWER

TCP Port 631

QUESTION 309

What does IPP do?

ANSWER

It is used to print to a network printer

QUESTION 310

What does LAND stand for?

ANSWER

Local Area Network Denial

QUESTION 311

What does a LAND attack do?

ANSWER

It uses malformed IP packets with the same source and destination address. When the victim receives the packet it can become confused and crash

QUESTION 312

What is a TEARDROP Attack?

ANSWER

Uses several large overlapping IP fragments. The system will try to reassemble them but they're too big and sometimes crash

QUESTION 313

What does a "Birthday Attack" exploit?

ANSWER

This attack finds two passwords with the same hash

QUESTION 314

What is a logic bomb?

ANSWER

Malicious code that wait for triggers to go off before activating Dates Times

QUESTION 315

What does the Computer Fraud and Abuse Act target?

ANSWER

Targets the deterring and prosecution of computer crimes against government systems, financial systems or systems that operate internationally

QUESTION 316

What is the financial trigger for the Computer Fraud and Abuse Act?

ANSWER

$5000 over 1 year

QUESTION 317

What does ECPA mean?

ANSWER

Electronic Communications Privacy Act

QUESTION 318

What did ECPA do?

ANSWER

Protects electronic communications from illegal wiretapping

QUESTION 319

What is the Patriot Act?

ANSWER

This act made it legal for the government to access internet communications, medical records, and even your home, all without notice or a search warrant.

QUESTION 320

What is a linux GUI-based tool for generating TCP/IP packets?

ANSWER

packETH

QUESTION 321

What is Nemesis?

ANSWER

A command-line tool for generating packets that is available on Linux and Windows

QUESTION 322

What is Hping?

ANSWER

A command-line tool that can generate TCP/IP packets. Available on all platforms

QUESTION 323

What is THC Hydra?

ANSWER

A dictionary attack tool

QUESTION 324

What is an interrupt?

ANSWER

Signal from hardware or software indicating that an event has occurred or that a process needs attention

QUESTION 325

What is a Threat in the risk equation?

ANSWER

This is the frequency or rate of a potential negative event

QUESTION 326

What is a vulnerability in the risk equation?

ANSWER

The likelihood that a threat will happen

QUESTION 327

What is cost in the risk equation?

ANSWER

Describes the damage of a successful attack

QUESTION 328

What is the risk equation?

ANSWER

Threat x Vulnerability

QUESTION 329

What type of encryption is excellent for bulk data?

ANSWER

Symmetric encryption is excellent for this

QUESTION 330

What port does syslog use?

ANSWER

UDP Port 514

QUESTION 331

What size hash does MD5 create?

ANSWER

This algorithm creates hashes that are 128-bits long

QUESTION 332

What size hash does SHA-1 create?

ANSWER

This algorithm creates a hash that is 160-bits long

QUESTION 333

What does SHA mean?

ANSWER

Secure Hash Algorithm

QUESTION 334

What are procedure documents?

ANSWER

Mandatory low-level guides that explain how to accomplish a task

QUESTION 335

How much detail should procedure documents have?

ANSWER

This document should have as much details as possible

QUESTION 336

What is a baseline document?

ANSWER

Provides a minimum level of security that a company's employees and systems must meet

QUESTION 337

What are guidelines?

ANSWER

Provides helpful bits of advice

QUESTION 338

What does a firewall rule between two IP addresses mean?

ANSWER

It allows any device from one to connect to any device on the other

QUESTION 339

What type of language is python?

ANSWER

This is a scripting language

QUESTION 340

What are examples of compiled languages?

ANSWER

C++ Java Visual Basic

QUESTION 341

What organization maintains WebGoat?

ANSWER

OWASP OPen Web App Security Project

QUESTION 342

What is COBIT?

ANSWER

COBIT = Objectives for Information and related Technology. It is a framework for IT and IT governance that provides a systematic way of integrating IT with business strategy and business risk

QUESTION 343

What does COBIT do?

ANSWER

It categorizes control objectives into four domains Planning & Organization Acquisition & Implementation Delivery & Support Monitoring & Evaluation

QUESTION 344

What does ISECOM maintain?

ANSWER

OSSTMM

QUESTION 345

What is Nslookup?

ANSWER

This command line command enables you to determine domain names and their IP addresses.

QUESTION 346

What does the nslookup command "ls -d" do?

ANSWER

This nslookup command lists all records for the specified DNS domain by initiating a zone transfer

QUESTION 347

What does the nslookup command "ls -t ANY" do?

ANSWER

This nslookup command lists all records for the specified DNS domain by initiating a zone transfer

QUESTION 348

What does the nslookup "ls -a" do?

ANSWER

This nslookup command lists aliases of computers in the DNS domain

QUESTION 349

What does the nslookup "ls -t CNAME" do?

ANSWER

This nslookup command lists aliases of computers in the DNS domain

QUESTION 350

What does the nslookup "ls -h" do?

ANSWER

This command lists CPU and OS information for the DNS domain

QUESTION 351

Waht does the nslookup "ls -t HINFO" do?

ANSWER

This command lists CPU and OS information for the DNS domain

QUESTION 352

What does the nslookup "ls -s" do?

ANSWER

This nslookup command lists well-known services on the DNS domain

QUESTION 353

What does the nslookup "ls -t WKS" do?

ANSWER

This nslookup command lists well-known services on the DNS domain

QUESTION 354

What is a multihomed device?

ANSWER

a devices that has more than one network connection

QUESTION 355

What does OSI mean?

ANSWER

Open Systems Interconnection

QUESTION 356

What kind of firewall can hide the source of network connections?

ANSWER

Proxy firewalls can do this

QUESTION 357

What type of firewall operates at Layer 7?

ANSWER

Application-level firewalls

QUESTION 358

What does 3DES mean?

ANSWER

Triple Data Encryption Standard

QUESTION 359

What does 3DES do?

ANSWER

It applies DES three times

QUESTION 360

How long is a 3DES key?

ANSWER

it produces a 168 bit key

QUESTION 361

How long is a DES key?

ANSWER

produces a 56 bit key

QUESTION 362

What is the recommended length for RSA keys?

ANSWER

2048 bits and up

QUESTION 363

What encryption supports 4096 it keys?

ANSWER

RSA Encryption supports this

QUESTION 364

What does an antivirus do?

ANSWER

It is used to prevent viruses from infecting a network

QUESTION 365

What is a zombie master used for?

ANSWER

It is used to control other computers on a botnet

QUESTION 366

What can be used to prevent internal users from accessing external networks?

ANSWER

Firewalls and proxy servers can be used to prevent this

QUESTION 367

What does ARP stand for?

ANSWER

Address Resolution Protocol

QUESTION 368

What does ARP do?

ANSWER

Converts IP address to MAC Address

QUESTION 369

What does RARP do?

ANSWER

Converts MAC addresses to IP Addresses

QUESTION 370

What does the cross-certification trust model do?

ANSWER

It enables participants to trust another participant's Public Key. Trust is established between the two.

QUESTION 371

What does the trusted third-part model do?

ANSWER

a third party establishes trust for the two wanting to communicate

QUESTION 372

What is another name for the bridge model?

ANSWER

This is also known as trusted third-party model

QUESTION 373

What is another name for trusted third-party model?

ANSWER

This is also known as the bridge model

QUESTION 374

What does XSS mean?

ANSWER

Cross-Site scripting

QUESTION 375

What is XSS?

ANSWER

When an attacker gets a victim to execute client-side code on a web app/site

QUESTION 376

What security method adheres to the entire IEEE 802.11i standard?

ANSWER

WPA2 Adheres to this entire standard

QUESTION 377

What is the IPv4 loopback address?

ANSWER

It is 127.0.0.1

QUESTION 378

What is 255.255.255.255?

ANSWER

It is a Layer 3 limited broadcast address

QUESTION 379

What is 192.168.0.255 an example of?

ANSWER

it is an example of a layer 3 directed broadcast address

QUESTION 380

What is FF:FF:FF:FF:FF:FF an example of?

ANSWER

It is an example of a Layer 2 ethernet broadcast address

QUESTION 381

What is a blue-team?

ANSWER

A group of security responders who are responsible for mitigating attacker activities and have access to all of an orgs information during a simulated attack

QUESTION 382

What is a red-team?

ANSWER

A group of security responders who are responsible for mounting attacks against an organization as part of an attack simulation

QUESTION 383

What are gray-box testers?

ANSWER

A pentester who has the same network knowledge as an employee

QUESTION 384

What are black-box testers?

ANSWER

A pentester who has no network knowledge

QUESTION 385

What is the primary benefit of signature-matching IDSs?

ANSWER

Their main benefit is that they have a low false positive rate

QUESTION 386

What is the primary benefit of anomaly-detection IDSs?

ANSWER

Their main benefit is being great at detecting new security threats

QUESTION 387

What encryption does WPA2 use?

ANSWER

It used AES-CCMP for encryption

QUESTION 388

What does AES-CCM stand for?

ANSWER

Advanced Encryption Standard-Counter Mode with Cipher Block Message Authentication Code Protocol

QUESTION 389

What does WPA use for encryption?

ANSWER

It uses TKIP for encryption

QUESTION 390

What does TKIP stand for?

ANSWER

Temporal Key Integrity Protocol

QUESTION 391

How long is TKIPs encryption?

ANSWER

Its encryption is 128-bit

QUESTION 392

Which encryption algorithm uses factors of prime numbers?

ANSWER

RSA

QUESTION 393

What security standard is based on BS 7799 and is focused on security governance?

ANSWER

ISO 27001 is based on this

QUESTION 394

What standard is ISO 27001 based on?

ANSWER

BS 7799

QUESTION 395

Who created COBIT?

ANSWER

Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI)

QUESTION 396

What is ISO 27001 focused on?

ANSWER

This standard is focused on governance for IT security

QUESTION 397

What attack typically uses an IFrame?

ANSWER

Clickjacking

QUESTION 398

What is clickjacking?

ANSWER

When an attacker places invisible links over legit links that intercept mouse clicks. The mouse clicks are then directed to the attacker's desired use

QUESTION 399

What is a watering hole attack?

ANSWER

A malicious attack that is directed toward a small group of specific individuals who visit the same website.

QUESTION 400

What is the primary goal of VAWTRAK?

ANSWER

This attack's main goal is to steal online banking information

QUESTION 401

What method does VAWTRAK use to infect?

ANSWER

Typically uses email messages with trojans as attachments

QUESTION 402

What is malvertising?

ANSWER

An advertisement that is infected with a virus

QUESTION 403

What does gpedit.msc do?

ANSWER

This command launches Microsoft Management Console (MMC) and initiates the Group Policy snap-in

QUESTION 404

What does compmgmt.msc do?

ANSWER

This command launches MMC with Computer Managment snap-in initiated

QUESTION 405

What does services.msc command do?

ANSWER

Launches MMC with services snap-in initiated. It allows you to see running services and modify whether those star manually or automatically

QUESTION 406

What does the eventvwr.msc command do?

ANSWER

It enables MMC with the Event Viewer enabled. It allows you to examine windows host's event logs, application logs, security logs and system logs

QUESTION 407

What is Firewalk?

ANSWER

It is a tool that is used to determine what ports are filtered by a gateway firewall

QUESTION 408

What does Firewalk manipulate?

ANSWER

It manipulates Time-to-live values so they expire one hop after the firewall

QUESTION 409

If Firewalk received "TTL expired in transit" what does that generally mean?

ANSWER

Firewalk assumes the port is open and unfiltered

QUESTION 410

If firewalk receives an unreachable message what does it assume?

ANSWER

Firewalk assumes the port is filtered

QUESTION 411

What does Firewalk do if it receives no response?

ANSWER

It assumes the port is filtered

QUESTION 412

What is fuzz testing?

ANSWER

Supplying completely random data to the object to see what it does

QUESTION 413

What is Fuzz testing a part of?

ANSWER

Microsoft Security Development Lifecycle

QUESTION 414

When would you use tcp-over-dns?

ANSWER

You would use this to evade firewall inspection

QUESTION 415

What would you use Hping2 for?

ANSWER

You would use this to craft packets

QUESTION 416

What would you use Angry IP Scanner for?

ANSWER

To perform ping sweeps

QUESTION 417

What does CSRF stand for?

ANSWER

Cross-Site Request Forgery

QUESTION 418

What does the btmp file show?

ANSWER

It show a list of failed login attempts on a linux computer

QUESTION 419

What does the utmp file contain?

ANSWER

It shows a list of currently logged in users on a linux system

QUESTION 420

What does the wtmp file contain?

ANSWER

It contains a list of all login and logout activity on a linux system

QUESTION 421

What does the file auth.log contain?

ANSWER

It contains system authorization information on a linux system

QUESTION 422

Where is the auth.log file found?

ANSWER

/var/log

QUESTION 423

What does CA stand for?

ANSWER

Certificate Authority

QUESTION 424

What does a CA do?

ANSWER

It issues digital certificates

QUESTION 425

What is a trusted third party in PKI called?

ANSWER

Certificate Authority (CA)

QUESTION 426

What does CRL stand for?

ANSWER

Certificate Revocation List

QUESTION 427

What does S/MIME stand for?

ANSWER

Secure/Multipurpose Internet Mail Extensions

QUESTION 428

What assesses the effectiveness of a security policy's implementation?

ANSWER

A Security Audit does this

QUESTION 429

What attempts to pinpoint vulnerabilities without exploiting them?

ANSWER

A Vulnerability Assessment does this

QUESTION 430

What tests an organization's security by attempting to exploit vulnerabilities?

ANSWER

A penetration test does this

QUESTION 431

What does the -d flag do in metagoofil?

ANSWER

Indicates the target website in metagoofil

QUESTION 432

What does the -t flag do in metagoofil?

ANSWER

It indicates the file type in metagoofil

QUESTION 433

What does the -f flag do in metagoofil?

ANSWER

It indicates the output file in metagoofil

QUESTION 434

What does the nmap command -O do?

ANSWER

This Nmap command indicates OS detection

QUESTION 435

What does the nmap command -sV indicate?

ANSWER

This nmap command indicates version scanning

QUESTION 436

What does the nmap command -sC indicate?

ANSWER

This nmap command indicates Script scanning

QUESTION 437

What nmap command indicates traceroute?

ANSWER

--traceroute

QUESTION 438

What does the -A command indicate in nmap?

ANSWER

This command does OS detection Script scanning Version scanning

QUESTION 439

What will sc query type=all show you?

ANSWER

This will show you information on drivers and services but only active services

QUESTION 440

What will sc query state=all show you?

ANSWER

This will show you all active and inactive services on Windows Server 2012

QUESTION 441

What does the ampersand (&) do in a linux command?

ANSWER

It indicates the process should run in the background on a linux machine

QUESTION 442

How do you make a process continue after the user logs out of a linux machine?

ANSWER

add nohop to the front of the command

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials