0% found this document useful (0 votes)
10 views

Ch. 6 Types of Hacking

The document outlines various types of hacking, including ethical, black hat, and white hat hacking, along with techniques like banner grabbing and SQL injection. It discusses tools and protocols used in network security, such as SNMP and Telnet, and emphasizes the importance of countermeasures against vulnerabilities. Additionally, it highlights the differences between ethical hackers and crackers, as well as common security threats and protective measures.

Uploaded by

tranve115
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Ch. 6 Types of Hacking

The document outlines various types of hacking, including ethical, black hat, and white hat hacking, along with techniques like banner grabbing and SQL injection. It discusses tools and protocols used in network security, such as SNMP and Telnet, and emphasizes the importance of countermeasures against vulnerabilities. Additionally, it highlights the differences between ethical hackers and crackers, as well as common security threats and protective measures.

Uploaded by

tranve115
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

6.

TYPES OF HACKING
(a) To check for file and print sharing on Windows
1. Banner grabbing is often used for ______.
systems
(a) White Hat Hacking (b) Black Hat Hacking
(b) To discover proxy servers on a network
(c) Gray Hat Hacking (d) Script Kiddies
(c) To discover a target system with the Net BIOS
2. SNMP stands for ______. null session vulnerability
(a) Simple Network Messaging Protocol (d) To locate the FTP service on the target host
(b) Simple Network Mailing Protocol 12. What does the term “Ethical Hacking” means?
(c) Simple Network Management Protocol (a) Someone who is using his/her skills for
(d) Simple Network Master Protocol defensive purposes.
3. Which of the following tool is used for Network (b) Someone who is hacking for ethical reasons.
Testing and Port Scanning? (c) Someone who is using his/her skills for ethical
(a) Net Cat (b) Super Scan reasons.
(c) Net Scan (d) All of Above (d) Someone who is using his/her skills for
4. An attacker can create an ______ attack by sending offensive purposes.
hundreds or thousands of e-mails with very large 13. What is major difference between an ethical hacker
attachments. and cracker?
(a) Connection Attack (a) The ethical hacker has authorization from the
(b) Auto responder Attack owner of the target.
(c) Attachment Overloading Attack (b) The ethical hacker is just a cracker who is
(d) All of the above getting paid.
5. Microsoft SQL server uses ______ protocol. (c) The ethical hacker does not use the same
(a) TCP (b) UDP techniques or skills as a cracker.
(c) TCP/UDP (d) None of above (d) The ethical hacker does it strictly for financial
motive sun like a cracker.
6. Counter measures for typical port scanning is
______. 14. Counter measures for SNMP ______.
(a) Traffic restriction (a) Preventing SNMP attacks can be as simple as
A-B-C.
(b) Gathering network information
(b) Always disable SNMP on hosts if you’re not
(c) Traffic denial
using it period.
(d) All of the above
(c) Block the SNMP port (UD Pport 161) at the
7. What is the primary goal of ethical hacking? network perimeter.
(a) Avoiding detection (d) All of above
(b) Testing security controls 15. Ethereal network analyses tool support ______
(c) Resolving security vulnerabilities operating system.
(d) Determining return on investment for security (a) Windows (b) Unix
measures (c) Mac SO (d) A and B
8. What is first phase of scanning? 16. ______ is an old IEEE802.11 standard.
(a) Maintaining access (b) Gaining access (a) WPA2 (b) WPA3
(c) Reconnaissance (d) Scanning (c) WEP (d) WPA
9. Hacking for cause is called ______. 17. An operating system is a program that acts as an
(a) Hacktivism (b) Black-hat hacking interface between the ______.
(c) White-Hat hacking (d) Script kiddies (a) Software and hardware
10. What port number does HTTPS use? (b) Software and user
(a) 53 (b) 443 (c) Hardware and user
(c) 80 (d) 21 (d) User and application
11. Why would an attacker want to perform as can on 18. Many well-known attacks against Windows can lead
port 137? to ______.
(a) Leakage of confidential information

P.1
Physics Motion in One Dimension

(b) Systems taken completely offline by DoS (b) SQL injection allows an attacker to access the
attacks SQL servers and execute SQL code under the
(c) Passwords being cracked and used to carry out privileges of the user used to connect to the
other attacks database
(d) All of Above (c) The use of PL-SQL opens the door to these
19. An attacker can create an attachment-overloading vulnerabilities
attack by sending ______. (d) None of above
(a) Hundreds or thousands of e-mails with very 28. XSS vulnerabilities target scripts executed
large attachments on______.
(b) Attachment overloading attacks may have a (a) Client side (b) Server side
couple of different goals (c) Both a and b (d) None of above
(c) (a) and (b) 29. In cross-site scripting, where does the malicious
(d) None of above script execute?
20. A basic tel net connection is made on port______ (a) On the web server (b) In the user’s browser
banner displayed on an e-mail server. (c) On the attacker’s system
(a) 25 (b) 443 (d) In the web app model code
(c) 80 (d) 21 30. Security configuration must be define and deployed
21. Banner Security tips are given for ______ Server. for ______.
(a) SMPT (b) POP3 (a) Application server (b) Web server
(c) IMAP (d) All of above (c) Data base server (d) All of Above
22. Data base vulnerabilities are ______. 31. Which type of attack gives the interesting
(a) Loose access permissions. information about website?
(b) Excessive retention of sensitive data. (a) Directory traversal (b) SQL injection
(c) Aggregation of personally identifiable (c) Client side scripting (d) None of above
information. 32. Directory traversal attack is also known as ______.
(d) All of Above. (a) Path traversal (b) Root directory attack
23. Loose action permission permits ______. (c) Both (a) and (b) (d) None of above
(a) More access to critical 33. Web servers provide two main levels of security
(b) Sensitive information than appropriate mechanisms ______.
(c) (a) and (b) (a) Access Control Lists (ACLs)
(d) None of above (b) Root directory
24. Hacker attacks on web application via ______. (c) Both (a) and (b)
(a) HTTP (b) HTTPS (d) None of above
(c) Both (a) and (b) (d) None of above 34. Counter measures for Directory Traversal
Attack______.
25. Web application security vulnerabilities are ______.
(a) Don’t store old, sensitive, or otherwise non-
(a) SQL Injection
public files on your Web server
(b) Directory Traversals
(b) Ensure that your Web server is properly
(c) Access Control Lists (ACLs) configured
(d) All of Above (c) Both (a) and (b)
26. SQL injection is security vulnerability that allows an (d) None of above
attacker ______.
35. Which phase of hacking performs actual attack on a
(a) To alter back end SQL statement network or system?
(b) Manipulate the users up plied data (a) Reconnaissance (b) Maintaining Access
(c) Both (a) and (b) (c) Scanning (d) Gaining Access
(d) None of above 36. Attempting to gain access to a network using an
27. Point out the wrong statement. employee’s credentials is called the ______mode of
(a) SQL injection vulnerabilities occur when ever ethical hacking.
in put is used in the construction of an SQL (a) Local networking (b) Social networking
query without being adequately constrained or (c) Physical entry (d) Cross Site Scripting
sanitized

2.2
Physics Motion in One Dimension

37. What are some of the most common vulnerabilities (c) Net Scan
that exist in a network or system? (d) Wild Packets Ether Peek
(a) Changing manufacturer, or recommended, 47. ______ tool is used for Windows for network
settings of a newly installed application queries from DNS look ups to trace routes.
(b) Additional un used features on commercial (a) Sam Spade (b) Nmap
software packages (c) Wild Packets Ether Peek
(c) Utilizing open source application code (d) Net Scan
(d) Balancing security concerns with functionality 48. Scanning port is tool which scan ______.
and ease of use of a system
(a) Software (b) Network
38. Net Scan Tools Pro is a great tool for general
(c) Hardware (d) All of Above
network information, such as
49. The port scan test is ______.
(a) The number of unique IP addresses
(a) The number of ports you scan
(b) Net BIOS names
(b) The tools you use
(c) MAC addresses
(c) The speed of your network links.
(d) All of above
(d) All of Above
39. Why would a ping sweep be used?
50. An ethical hacker should scan ______ and______
(a) To identify live systems
ports on each network.
(b) To locate live systems
(a) 65,535UDP (b) 65,535TCP
(c) To identify open ports
(c) Both a and b (d) None of above
(d) To locate firewalls
51. What port does DNS used?
40. What port does Telnet use?
(a) 53 (b) 7
(a) 22 (b) 80
(c) 21 (d) 37
(c) 20 (d) 23
52. Which protocol is used by IMAP (Internet Message
41. Network infrastructure security involves ______. Access Protocol)?
(a) Network host configuration (a) UDP (b) TCP
(b) Interaction of installed security devices (c) Both a and b (d) None of above
(c) Protocols in use 53. Which port no. is used by Berkeley for commands
(d) All of Above such as rsh, rexec, and rlogin?
42. DoS is abbreviated as______. (a) 512 (b) 513
(a) Denial of Service (c) 514 (d) All of Above
(b) Distribution of Server 54. 12345, 12346, 12631, 12632, 20034, 20035 port no.
(c) Denial of Server are used for which service?
(d) Distribution of Service (a) Net Bus (b) Trinoo
43. A hacker using a network analyser can______. (c) Gnutella
(a) Steal confidential information (d) Windows Terminal Server
(b) Modify data 55. Any system is potential for______, if there are open
(c) Access information ports on one’s personal computer.
(d) None of above (a) The loss of data
44. _____ tool is used for ping sweeps and port (b) The occurrence of a virus
scanning. (c) Complete system compromise
(a) Net Scan (d) All of above
(b) Super Scan 56. Port scanning is considered a serious threat to
(c) Nmap _____.
(d) Wild Packets Ether Peek (a) Software (b) Hardware
45. ______ tool is used for host-port probing and (c) Personal PC (d) Network
operating-system fingerprinting. 57. Protection from port scanning is often achieved
(a) Sam Spade (b) Net Scan through the use of a______.
(c) NmaporN Map Win (d) Net cat (a) Firewall (b) Spy ware
46. ______ tool is used for network analyser. (c) Antivirus (d) All of above
(a) Sam Spade (b) Net Scan 58. A firewall monitors ______.

2.3
Physics Motion in One Dimension

(a) Incoming connection (c) X Site Scripting


(b) Outgoing connection (d) Cross Site Scripting
(c) Both (a) and (b) 70. Which tool is used to modify the ERP table?
(d) None of above (a) Dsniff tool (b) Sniffdect
59. ______ are the best protection one can invest in with (c) Promice detect (d) Network analyzer
regard to port scanning. 71. Ether Peek by Wild Packets network analyser tool
(a) Antivirus (b) Firewalls supports ______ operating system.
(c) Gateways (d) Routers (a) Windows (b) UNIX
60. Network layer firewall works as a ______. (c) Windows and UNIX (d) None of above
(a) Frame filter (b) Packet filter 72. Ethereal network analyser tool supports ______
(c) Content filter (d) Virus filter operating system.
61. ______ tells Nmap to perform aping scan. (a) Windows (b) UNIX
(a) sP (b) n (c) Windows and UNIX (d) None of above
(c) -T4 (d) All of above 73. Ettercap network analyser tool supports ______
62. A network monitoring software helps you to monitor operating system.
the performance of ______. (a) Windows (b) UNIX
(a) Network services (c) Windows and UNIX (d) None of above
(b) Bandwidth utilization 74. Dsniff network analyser tool supports ______
(c) Routers and traffic flow operating system.
(d) All of above (a) Windows (b) UNIX
63. SNMP is compromised, when hacker can gather (c) Windows and UNIX (d) None of above
network information as ______. 75. 6346, 6347 port no. are used for which services?
(a) ARP table (b) TCP connection (a) Gnutella
(c) Both (a) and (b) (d) None of above (b) Net Bus
64. To prevent SNMP attack, which port No. has to be (c) Pc Anywhere
blocked? (d) Windows Terminal Server
(a) 20 (b) 161 76. Echo service is used by which protocol?
(c) 23 (d) 80 (a) TCP (b) UDP
65. Which tool is not used for banner grabbing? (c) TCP and UDP (d) None of above
(a) Telnet (b) Nmap 77. Charge n service is used by which protocol?
(c) Net cat (d) Super scan (a) TCP (b) UDP
66. When your network be haves erratically, a network (c) TCP and UDP (d) None of above
analyser can help you in______. 78. SSH service is used by which protocol?
(a) Track and isolate malicious network usage (a) TCP (b) UDP
(b) Detect malicious Trojan-horse applications (c) TCP and UDP (d) None of above
(c) Monitor and track down DoS attacks 79. Telnet and SMTP (Simple Mail Transfer Protocol)
(d) All of above service is used by which protocol?
67. What types of functions are performed by network (a) TCP (b) UDP
Analyser? (c) TCP and UDP (d) None of above
(a) Captures all network traffic 80. DNS (Domain Name System) and TFTP (Trivial
(b) Interprets or decodes what is found into a File Transfer Protocol) service is used by which
human-readable format protocol?
(c) Displays it all in chronological order (a) TCP (b) UDP
(d) All of above (c) TCP and UDP (d) None of above
68. Network analysers are often referred to as______. 81. Which port no. is used by echo service?
(a) Sniffer (b) Spoofer (a) 7 (b) 19
(c) Both a and b (d) None of above (c) 20 (d) 21
69. XSS is abbreviated as______. 82. Which port no. is used by Chargen service?
(a) Extreme Secure Scripting (a) 7 (b) 19
(b) Cross Site Security (c) 20 (d) 21

2.4
Physics Motion in One Dimension

83. Which port no. is used by FTP data (File Transfer (c) 443 (d) 1214
Protocol) service? 97. Which port no. is used by Windows Terminal
(a) 7 (b) 19 Server?
(c) 20 (d) 21 (a) 161 (b) 220
84. Which port no. is used by FTP control service? (c) 443 (d) 1214
(a) 7 (b) 19 98. Which port no. is used by pcAnywhere service?
(c) 20 (d) 21 (a) 5631 (b) 5632
85. Which port does SSH used? (c) Both a and b (d) None of above
(a) 22 (b) 23 99. Which port no. is used by Trinoo service?
(c) 25 (d) 37 (a) 27444 (b) 27665
86. Which port does SMTP (Simple Mail Transfer (c) 31335 (d) All of above
Protocol) used? 100. Which port no. is used by back office service?
(a) 22 (b) 23 (a) 31337 (b) 27444
(c) 25 (d) 37 (c) 27665 (d) 31335
87. Which port no. is used by Daytime service? 101. Banner Grabbing is an example of what?
(a) 22 (b) 23 (a) Foot printing
(c) 25 (d) 37 (b) Active operating system fingerprinting
88. Which port no. is used by TFTP (Trivial File (c) Passive operating system fingerprinting
Transfer Protocol) service? (d) Application analysis
(a) 53 (b) 69 102. Why would an attacker want to perform a scan port
(c) 79 (d) 80 no.137?
89. Which port no. is used by Finger service? (a) To check for file and print sharing on Windows
(a) 53 (b) 69 systems
(c) 79 (d) 80 (b) To discover proxy servers on a network
90. Which port does POP3 (Post Office Protocol (c) To discover a target system with the Net BIOS
version3) used? null session vulnerability
(a) 110 (b) 111 (d) To locate the FTP service on the target host
(c) 135 (d) 137 103. Banner grabbing is used for ______.
91. Which port does SUNRPC (remote procedure calls) (a) White Hat Hacking (b) Black Hat Hacking
used? (c) Grey Hat Hacking (d) Script Kiddies
(a) 110 (b) 111 104. Which tool is used for ping sweeps and port
(c) 135 (d) 137 scanning?
92. Which port does RPC/DCE end point map per for (a) Net cat (b) Sam Spade
Microsoft networks is used? (c) Super Scan (d) All the above
(a) 110 (b) 111 105. Which of the following tool is used for security
(c) 135 (d) 137 checks as port scanning and firewall testing?
93. Which port no. is used for Net BIOS over TCP/IP (a) Net cat (b) Nmap
service? (c) Data communication (d) Net scan
(a) 137 (b) 138 106. What is the most important activity in system
(c) 139 (d) All of above cracking?
94. Which port does SNMP (Simple Network (a) Information gathering(b) Cracking password
Management Protocol) used? (c) Escalating privileges (d) Covering tracks
(a) 161 (b) 220 107. Which Nmaps can is does not completely open a
(c) 443 (d) 1214 TCP connection?
95. Which port does IMAP (Internet Message Access (a) SYN stealth scan (b) TCP scan
Protocol) used? (c) XMAS trees can (d) ACK scan
(a) 161 (b) 220 108. Key loggers are form of ______.
(c) 443 (d) 1214 (a) Spy ware (b) Shoulder surfing
96. Which port no. is used by Microsoft SQL Server? (c) Trojan (d) Social engineering
(a) 161 (b) 220 109. Nmap is abbreviated as Network Mapper.

2.5
Physics Motion in One Dimension

(a) True (b) False 119. Why would a hacker use a proxy server?
110. ______is a popular tool used for discovering (a) To create a stronger connection with the target
network as well as security auditing. (b) To create a ghost server on the network
(a) Ettercap (b) Metasploit (c) To obtain are mote access connection
(c) Nmap (d) Burp Suit (d) To hide malicious activity on the network
111. Which of this Nmap do not check? 120. Sniffing is used to perform ______finger printing.
(a) Services different hosts are offering. (a) Passive stack (b) Active stack
(b) On what OS they are running. (c) Passive banner grabbing
(c) What kind of firewall in use? (d) Scanned
(d) What type of antivirus in use? 121. Services running on a system are determined by
112. What is purpose of Denial of Service attacks? ______.
(a) Exploit weakness in TCP/IP attack (a) The system’s IP address
(b) To execute a Trojan horse on a system (b) The Active Directory
(c) To overload a system so it is no longer (c) The system’s network name
operational (d) The port assigned
(d) To shutdown services by turning them off 122. What are the types of scanning?
113. What are the some of the most common (a) Port, network, and services
vulnerabilities that exist in a network system? (b) Network, vulnerability, and port
(a) Changing manufacturer, or recommended (c) Passive, active, and interactive
settings of newly installed application
(d) Server, client, and network
(b) Additional un used feature on commercials of
123. Enumeration is part of what phase of ethical
ware package
hacking?
(c) Utilizing open source application code
(a) Reconnaissance (b) Maintaining Access
(d) Balancing security and ease of use of system
(c) Gaining Access (d) Scanning
114. Which of the following is not a characteristic of
124. ______ framework made cracking of vulnerabilities
ethical hacker?
easy like point and click.
(a) Excellent knowledge of Windows
(a) Net (b) Metasploit
(b) Understands the process of exploiting network
(c) Zeus (d) Ettercap
vulnerabilities
125. ______is a popular IP address and port scanner.
(c) Patience, persistence and perseverance
(a) Cain and Abel (b) Snort
(d) Has the highest level of security for the
organization (c) Angry IP Scanner (d) Ettercap
115. The first phase of hacking an IT system is 126. ______is a popular tool used for network analysis in
compromise of which foundation of security? multi protocol diverse network.
(a) Availability (b) Confidentiality (a) Snort (b) Super Scan
(c) Integrity (d) Authentication (c) Burp Suit (d) EtterPeak
116. What are the port states determined by Nmap? 127. ______ scans TCP ports and resolves different host
names.
(a) Active, inactive, standby
(a) SuperScan (b) Snort
(b) Open, half-open, closed
(c) Ettercap (d) QualysGuard
(c) Open, filtered, unfiltered
128. What tool can be used to perform SNMP
(d) Active, closed, unused
enumeration?
117. Which of the following will allow foot printing to be
(a) DNS lookup (b) Whois
conducted without detection?
(c) Ns look up (d) IP Network Browser
(a) Ping Sweep (b) Trace route
129. Wires harkisa ______tool.
(c) War Dialers (d) ARIN
(a) Network protocol analysis
118. Performing hacking activities with the intent on
gaining visibility for an un fair situation is (b) Network connection security
called______. (c) Connection analysis
(a) Cracking (b) Analysis (d) Defending malicious packet-filtering
(c) Hacktivism (d) Exploitation 130. Air cracking is used for______.

2.6
Physics Motion in One Dimension

(a) Firewall by passing 141. Which protocols are in use is vulnerable?


(b) Wi-Fi attacks (a) TCL (b) SSL
(c) Packet filtering (c) FTP (d) SMTP
(d) System password cracking 142. SSL stands for ______.
131. Phishing is a form of______. (a) Secure Sockets Layer
(a) Spamming (b) Identify Theft (b) Software Security Layer
(c) Impersonation (d) Scanning (c) Socket Security Layer
132. ______ is used for searching of multiple hosts in (d) System Software Layer
order to target just one specific open port. 143. ______ include phishing, SQL injection, hacking,
(a) Ping Sweep (b) Port scan social engineering, spamming, denial of service
(c) Ipconfig (d) Ipconfig attacks, Trojans, virus and worm attacks.
133. ARP spoofing is often referred to as ______. (a) Operating system vulnerabilities
(a) Man-in-the-Middle attack (b) Web vulnerabilities
(b) Denial-of-Service attack (c) Wireless network vulnerabilities
(c) Sniffing (d) Spoofing (d) Network infrastructure vulnerabilities
134. ______ is a tool that allows you to look in to 144. Who invented worm attack ______?
network and analysed at a going across the wire for (a) Brighten Godfrey (b) Alan Yeung
network optimization, security and troubleshooting (c) Robert Morris (d) None of above
purposes. 145. A packet with no flags set is which type of scan?
(a) Network analyser (b) Crypt tool (a) TCP (b) XMAS
(c) John-the-Ripper (d) Backtrack (c) IDLE (d) NULL
135. ______ protocol is used for network monitoring.
(a) SNMP (b) FTP
(c) RELNET (d) ARP
136. What is the attack called “evil twin”?
(a) Rouge access point (b) ARP poisoning
(c) Session hijacking (d) MAC spoofing
137. Which type of hacker represents the highest risk to
your network?
(a) Black-hat hackers
(b) Grey-hat hackers
(c) Script kiddies
(d) Disgruntled employees
138. In computer networking, ______ is any technical
effort to manipulate the normal behaviour of
network connections and connected systems.
(a) Hacking (b) Evidence
(c) Tracing (d) None of above
139. We can eliminate many well-known network
vulnerabilities by simply patching your network
hosts with their latest ______ and ______.
(a) Hackers and Packers
(b) Vendor software and firmware patches
(c) Software and Hardware
(d) None of above
140. IDS stands for______.
(a) Intrusion detection system
(b) Information documentation service
(c) Intrusion documentation system
(d) None of above

2.7
Physics Motion in One Dimension

1. (a) 2. (c) 3. (d) 4. (d) 5. (c) 6. (d) 7. (c) 8. (d) 9. (b) 10. (b)
11. (a) 12. (a) 13. (a) 14. (d) 15. (d) 16. (c) 17. (a) 18. (d) 19. (c) 20. (a)
21. (d) 22. (d) 23. (c) 24. (c) 25. (d) 26. (c) 27. (c) 28. (a) 29. (b) 30. (d)
31. (a) 32. (a) 33. (c) 34. (c) 35. (d) 36. (a) 37. (b) 38. (d) 39. (a) 40. (d)
41. (d) 42. (a) 43. (a) 44. (b) 45. (c) 46. (d) 47. (a) 48. (b) 49. (d) 50. (c)
51. (a) 52. (b) 53. (d) 54. (a) 55. (d) 56. (c) 57. (a) 58. (c) 59. (b) 60. (b)
61. (a) 62. (d) 63. (c) 64. (b) 65. (a) 66. (d) 67. (d) 68. (a) 69. (d) 70. (a)
71. (a) 72. (c) 73. (c) 74. (b) 75. (a) 76. (c) 77. (c) 78. (a) 79. (c) 80. (c)
81. (a) 82. (b) 83. (c) 84. (d) 85. (a) 86. (c) 87. (d) 88. (b) 89. (c) 90. (a)
91. (b) 92. (c) 93. (d) 94. (a) 95. (b) 96. (d) 97. (c) 98. (c) 99. (d) 100. (a)
101. (c) 102. (c) 103. (a) 104. (c) 105. (a) 106. (b) 107. (a) 108. (a) 109. (a) 110. (c)
111. (d) 112. (c) 113. (b) 114. (d) 115. (b) 116. (c) 117. (d) 118. (c) 119. (a) 120. (a)
121. (d) 122. (b) 123. (c) 124. (b) 125. (c) 126. (d) 127. (a) 128. (d) 129. (a) 130. (b)
131. (c) 132. (a) 133. (a) 134. (a) 135. (a) 136. (a) 137. (d) 138. (a) 139. (b) 140. (a)
141. (b) 142. (a) 143. (d) 144. (c) 145. (d)

ANSWER KEY

2.8

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy