Cyber Security


Q1. What is the preferred communications method used with systems on a bot­net?

  1. IRC
  2. E­mail
  3. ICMP
  4. TFTP

Show Answer

Ans: 1.IRC

 

Q2. What will an open port return from an ACK scan?

  1. RST
  2. SYN/ACK
  3. FIN
  4. Nothing

Show Answer

Ans: 1.RST

 

Q3. Your target system is behind a firewall. Using hping2, you craft SYN packets to send with a hop count capable of reaching the host. You then send these packets out with port numbers from 1 to 1024. What action are you performing?

  1. Firewalling
  2. Firewalking
  3. Passive footprinting
  4. XMAS scan

Show Answer

Ans: 2.Firewalking

 

Q4. Which of the following is true regarding WEP cracking?

  1. Initialization vectors are small, get reused frequently, and are sent in cleartext.
  2. Initialization vectors are small, get reused frequently, but are encrypted during transmission.
  3. Initialization vectors are large, get reused frequently, and are sent in cleartext.
  4. Initialization vectors are large, get reused frequently, but are encrypted during transmission.

Show Answer

Ans: 1.Initialization vectors are small, get reused frequently, and are sent in cleartext.

 

Q5. Which of the following best describes a distributed denial­of­service attack?

  1. A DoS against an entire subnet, affecting multiple systems
  2. A DoS against multiple systems across an enterprise network
  3. A DoS against similar systems in different target networks
  4. A DoS carried out by multiple systems

Show Answer

Ans: 4.A DoS carried out by multiple systems

 

Q6. Which of the following is a passive wireless discovery tool?

  1. NetStumbler
  2. Aircrack
  3. Kismet
  4. Netsniff

Show Answer

Ans: 3.Kismet

 

Q7. What does the program EliteWrap do?

  1. Provides secure, encrypted tunneling between hosts
  2. Provides proxy services to obfuscate source IPs
  3. Ports code easily between different operating systems
  4. Binds Trojans to legitimate files for exploitation later

Show Answer

Ans: 4.Binds Trojans to legitimate files for exploitation later

 

Q8. Scanning is performed in which phase of a pen test?

  1. Pre­attack
  2. Attack
  3. Post­attack
  4. Reconnaissance

Show Answer

Ans: 1.Preattack

 

Q9. What is TKIP and how does it make WPA­2 a better security choice for your wireless network?

  1. Temporal Key Integrity Protocol. It forces a key change every 10,000 packets or so.
  2. Temporal Key Integrity Protocol. It forces a key change every time a bit is sent.
  3. Temporary Key Integration Protocol. It forces a key change every 10,000 packets or so.
  4. Temporary Key Integration Protocol. It forces a key change every time a bit is sent.

Show Answer

Ans: 1.Temporal Key Integrity Protocol. It forces a key change every 10,000 packets or so.

 

Q10. What is the attack called “evil twin”?

  1. MAC spoofing
  2. ARP poisoning
  3. Rogue access point
  4. Session hijacking

Show Answer

Ans: 3.Rogue access point

 


Subscribe us to receive more such articles updates in your email.

If you have any questions, feel free to ask in the comments section below. Nothing gives me greater joy than helping my readers!

Disclaimer: This tutorial is for educational purpose only. Individual is solely responsible for any illegal act.

Comments:

Your email address will not be published. Required fields are marked *

 
error: