QB 6
QB 6
QB 6
2. Which of the following tool is used for Network Testing and port Scanning
A. NetCat
B. SuperScan
C. NetScan
D. All of above
5. Which of the following tool is used for Windows for network queries from DNS
lookups to
trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
7. Which of the following tool is used for security checks as port scanning and
firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
12. is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit
15. What are the some of the most common vulnerabilities that exist in a network
system?
A. Changing manufacturer, or recommended settings of newly installed application.
B. Additional unused feature on commercial software package.
C. Utilizing open source application code.
D. Balancing security and ease of use of system.
22. Which of the following will allow foot printing to be conducted without
detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
23. Performing hacking activities with the intent on gaining visibility for an
unfair situation is
called .
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
30. framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap
32. is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
39 is used for searching of multiple hosts in order to target just one specific
open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
41. is a tool that allows you to look into network and analyze data going across
the wire
for network optimization, security and troubleshooting purposes.
A. Network analyzer
B. Crypt tool
C. John-the -Ripper
D. Back track
47. When a hacker attempts to attack a host via the internet it is known as what
type of attack?
A. local access
B. remote attack
C. internal attack
D. physical access
Ans: B
49. A type of attack that overloads the resources of a single system to cause it to
crash or hang.
A. Resource Starvation
B. Active Sniffing
C. Passive Sniffing
D. Session Hijacking
53.Network consist devices such as routers, firewalls, hosts that you must assess
as a part of
process.
A. Prackers
B. Black hat hacking
C. Grey hat hacking process
D. Ethical hacking process.
54. Network infrastructure vulnerabilities are the foundation for most technical
security
issues in your information systems.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
55. attack, which can take down your Internet connection or your entire network.
A. MAC
B. DOS
C. IDS
D. None of above
60. include phishing, SQL injection, hacking, social engineering, spamming, denial
of
service attacks, Trojans, virus and worm attacks.
A. Operating system vulnerabilities
B. Web vulnerabilities
C. Wireless network vulnerabilities
D. Network infrastructure vulnerabilities
64.What are some of the most common vulnerabilities that exist in a network or
system?
A. Changing manufacturer, or recommended, settings of a newly installed
application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system.