Cyber Security
Q1. What is the preferred communications method used with systems on a botnet?
- IRC
- Email
- ICMP
- TFTP
Ans: 1.IRC
Q2. What will an open port return from an ACK scan?
- RST
- SYN/ACK
- FIN
- Nothing
Ans: 1.RST
Q3. Your target system is behind a firewall. Using hping2, you craft SYN packets to send with a hop count capable of reaching the host. You then send these packets out with port numbers from 1 to 1024. What action are you performing?
- Firewalling
- Firewalking
- Passive footprinting
- XMAS scan
Ans: 2.Firewalking
Q4. Which of the following is true regarding WEP cracking?
- Initialization vectors are small, get reused frequently, and are sent in cleartext.
- Initialization vectors are small, get reused frequently, but are encrypted during transmission.
- Initialization vectors are large, get reused frequently, and are sent in cleartext.
- Initialization vectors are large, get reused frequently, but are encrypted during transmission.
Ans: 1.Initialization vectors are small, get reused frequently, and are sent in cleartext.
Q5. Which of the following best describes a distributed denialofservice attack?
- A DoS against an entire subnet, affecting multiple systems
- A DoS against multiple systems across an enterprise network
- A DoS against similar systems in different target networks
- A DoS carried out by multiple systems
Ans: 4.A DoS carried out by multiple systems
Q6. Which of the following is a passive wireless discovery tool?
- NetStumbler
- Aircrack
- Kismet
- Netsniff
Ans: 3.Kismet
Q7. What does the program EliteWrap do?
- Provides secure, encrypted tunneling between hosts
- Provides proxy services to obfuscate source IPs
- Ports code easily between different operating systems
- Binds Trojans to legitimate files for exploitation later
Ans: 4.Binds Trojans to legitimate files for exploitation later
Q8. Scanning is performed in which phase of a pen test?
- Preattack
- Attack
- Postattack
- Reconnaissance
Ans: 1.Preattack
Q9. What is TKIP and how does it make WPA2 a better security choice for your wireless network?
- Temporal Key Integrity Protocol. It forces a key change every 10,000 packets or so.
- Temporal Key Integrity Protocol. It forces a key change every time a bit is sent.
- Temporary Key Integration Protocol. It forces a key change every 10,000 packets or so.
- Temporary Key Integration Protocol. It forces a key change every time a bit is sent.
Ans: 1.Temporal Key Integrity Protocol. It forces a key change every 10,000 packets or so.
Q10. What is the attack called “evil twin”?
- MAC spoofing
- ARP poisoning
- Rogue access point
- Session hijacking
Ans: 3.Rogue access point
Subscribe us to receive more such articles updates in your email.
If you have any questions, feel free to ask in the comments section below. Nothing gives me greater joy than helping my readers!
Disclaimer: This tutorial is for educational purpose only. Individual is solely responsible for any illegal act.