Ch. 6 Types of Hacking
Ch. 6 Types of Hacking
TYPES OF HACKING
(a) To check for file and print sharing on Windows
1. Banner grabbing is often used for ______.
systems
(a) White Hat Hacking (b) Black Hat Hacking
(b) To discover proxy servers on a network
(c) Gray Hat Hacking (d) Script Kiddies
(c) To discover a target system with the Net BIOS
2. SNMP stands for ______. null session vulnerability
(a) Simple Network Messaging Protocol (d) To locate the FTP service on the target host
(b) Simple Network Mailing Protocol 12. What does the term “Ethical Hacking” means?
(c) Simple Network Management Protocol (a) Someone who is using his/her skills for
(d) Simple Network Master Protocol defensive purposes.
3. Which of the following tool is used for Network (b) Someone who is hacking for ethical reasons.
Testing and Port Scanning? (c) Someone who is using his/her skills for ethical
(a) Net Cat (b) Super Scan reasons.
(c) Net Scan (d) All of Above (d) Someone who is using his/her skills for
4. An attacker can create an ______ attack by sending offensive purposes.
hundreds or thousands of e-mails with very large 13. What is major difference between an ethical hacker
attachments. and cracker?
(a) Connection Attack (a) The ethical hacker has authorization from the
(b) Auto responder Attack owner of the target.
(c) Attachment Overloading Attack (b) The ethical hacker is just a cracker who is
(d) All of the above getting paid.
5. Microsoft SQL server uses ______ protocol. (c) The ethical hacker does not use the same
(a) TCP (b) UDP techniques or skills as a cracker.
(c) TCP/UDP (d) None of above (d) The ethical hacker does it strictly for financial
motive sun like a cracker.
6. Counter measures for typical port scanning is
______. 14. Counter measures for SNMP ______.
(a) Traffic restriction (a) Preventing SNMP attacks can be as simple as
A-B-C.
(b) Gathering network information
(b) Always disable SNMP on hosts if you’re not
(c) Traffic denial
using it period.
(d) All of the above
(c) Block the SNMP port (UD Pport 161) at the
7. What is the primary goal of ethical hacking? network perimeter.
(a) Avoiding detection (d) All of above
(b) Testing security controls 15. Ethereal network analyses tool support ______
(c) Resolving security vulnerabilities operating system.
(d) Determining return on investment for security (a) Windows (b) Unix
measures (c) Mac SO (d) A and B
8. What is first phase of scanning? 16. ______ is an old IEEE802.11 standard.
(a) Maintaining access (b) Gaining access (a) WPA2 (b) WPA3
(c) Reconnaissance (d) Scanning (c) WEP (d) WPA
9. Hacking for cause is called ______. 17. An operating system is a program that acts as an
(a) Hacktivism (b) Black-hat hacking interface between the ______.
(c) White-Hat hacking (d) Script kiddies (a) Software and hardware
10. What port number does HTTPS use? (b) Software and user
(a) 53 (b) 443 (c) Hardware and user
(c) 80 (d) 21 (d) User and application
11. Why would an attacker want to perform as can on 18. Many well-known attacks against Windows can lead
port 137? to ______.
(a) Leakage of confidential information
P.1
Physics Motion in One Dimension
(b) Systems taken completely offline by DoS (b) SQL injection allows an attacker to access the
attacks SQL servers and execute SQL code under the
(c) Passwords being cracked and used to carry out privileges of the user used to connect to the
other attacks database
(d) All of Above (c) The use of PL-SQL opens the door to these
19. An attacker can create an attachment-overloading vulnerabilities
attack by sending ______. (d) None of above
(a) Hundreds or thousands of e-mails with very 28. XSS vulnerabilities target scripts executed
large attachments on______.
(b) Attachment overloading attacks may have a (a) Client side (b) Server side
couple of different goals (c) Both a and b (d) None of above
(c) (a) and (b) 29. In cross-site scripting, where does the malicious
(d) None of above script execute?
20. A basic tel net connection is made on port______ (a) On the web server (b) In the user’s browser
banner displayed on an e-mail server. (c) On the attacker’s system
(a) 25 (b) 443 (d) In the web app model code
(c) 80 (d) 21 30. Security configuration must be define and deployed
21. Banner Security tips are given for ______ Server. for ______.
(a) SMPT (b) POP3 (a) Application server (b) Web server
(c) IMAP (d) All of above (c) Data base server (d) All of Above
22. Data base vulnerabilities are ______. 31. Which type of attack gives the interesting
(a) Loose access permissions. information about website?
(b) Excessive retention of sensitive data. (a) Directory traversal (b) SQL injection
(c) Aggregation of personally identifiable (c) Client side scripting (d) None of above
information. 32. Directory traversal attack is also known as ______.
(d) All of Above. (a) Path traversal (b) Root directory attack
23. Loose action permission permits ______. (c) Both (a) and (b) (d) None of above
(a) More access to critical 33. Web servers provide two main levels of security
(b) Sensitive information than appropriate mechanisms ______.
(c) (a) and (b) (a) Access Control Lists (ACLs)
(d) None of above (b) Root directory
24. Hacker attacks on web application via ______. (c) Both (a) and (b)
(a) HTTP (b) HTTPS (d) None of above
(c) Both (a) and (b) (d) None of above 34. Counter measures for Directory Traversal
Attack______.
25. Web application security vulnerabilities are ______.
(a) Don’t store old, sensitive, or otherwise non-
(a) SQL Injection
public files on your Web server
(b) Directory Traversals
(b) Ensure that your Web server is properly
(c) Access Control Lists (ACLs) configured
(d) All of Above (c) Both (a) and (b)
26. SQL injection is security vulnerability that allows an (d) None of above
attacker ______.
35. Which phase of hacking performs actual attack on a
(a) To alter back end SQL statement network or system?
(b) Manipulate the users up plied data (a) Reconnaissance (b) Maintaining Access
(c) Both (a) and (b) (c) Scanning (d) Gaining Access
(d) None of above 36. Attempting to gain access to a network using an
27. Point out the wrong statement. employee’s credentials is called the ______mode of
(a) SQL injection vulnerabilities occur when ever ethical hacking.
in put is used in the construction of an SQL (a) Local networking (b) Social networking
query without being adequately constrained or (c) Physical entry (d) Cross Site Scripting
sanitized
2.2
Physics Motion in One Dimension
37. What are some of the most common vulnerabilities (c) Net Scan
that exist in a network or system? (d) Wild Packets Ether Peek
(a) Changing manufacturer, or recommended, 47. ______ tool is used for Windows for network
settings of a newly installed application queries from DNS look ups to trace routes.
(b) Additional un used features on commercial (a) Sam Spade (b) Nmap
software packages (c) Wild Packets Ether Peek
(c) Utilizing open source application code (d) Net Scan
(d) Balancing security concerns with functionality 48. Scanning port is tool which scan ______.
and ease of use of a system
(a) Software (b) Network
38. Net Scan Tools Pro is a great tool for general
(c) Hardware (d) All of Above
network information, such as
49. The port scan test is ______.
(a) The number of unique IP addresses
(a) The number of ports you scan
(b) Net BIOS names
(b) The tools you use
(c) MAC addresses
(c) The speed of your network links.
(d) All of above
(d) All of Above
39. Why would a ping sweep be used?
50. An ethical hacker should scan ______ and______
(a) To identify live systems
ports on each network.
(b) To locate live systems
(a) 65,535UDP (b) 65,535TCP
(c) To identify open ports
(c) Both a and b (d) None of above
(d) To locate firewalls
51. What port does DNS used?
40. What port does Telnet use?
(a) 53 (b) 7
(a) 22 (b) 80
(c) 21 (d) 37
(c) 20 (d) 23
52. Which protocol is used by IMAP (Internet Message
41. Network infrastructure security involves ______. Access Protocol)?
(a) Network host configuration (a) UDP (b) TCP
(b) Interaction of installed security devices (c) Both a and b (d) None of above
(c) Protocols in use 53. Which port no. is used by Berkeley for commands
(d) All of Above such as rsh, rexec, and rlogin?
42. DoS is abbreviated as______. (a) 512 (b) 513
(a) Denial of Service (c) 514 (d) All of Above
(b) Distribution of Server 54. 12345, 12346, 12631, 12632, 20034, 20035 port no.
(c) Denial of Server are used for which service?
(d) Distribution of Service (a) Net Bus (b) Trinoo
43. A hacker using a network analyser can______. (c) Gnutella
(a) Steal confidential information (d) Windows Terminal Server
(b) Modify data 55. Any system is potential for______, if there are open
(c) Access information ports on one’s personal computer.
(d) None of above (a) The loss of data
44. _____ tool is used for ping sweeps and port (b) The occurrence of a virus
scanning. (c) Complete system compromise
(a) Net Scan (d) All of above
(b) Super Scan 56. Port scanning is considered a serious threat to
(c) Nmap _____.
(d) Wild Packets Ether Peek (a) Software (b) Hardware
45. ______ tool is used for host-port probing and (c) Personal PC (d) Network
operating-system fingerprinting. 57. Protection from port scanning is often achieved
(a) Sam Spade (b) Net Scan through the use of a______.
(c) NmaporN Map Win (d) Net cat (a) Firewall (b) Spy ware
46. ______ tool is used for network analyser. (c) Antivirus (d) All of above
(a) Sam Spade (b) Net Scan 58. A firewall monitors ______.
2.3
Physics Motion in One Dimension
2.4
Physics Motion in One Dimension
83. Which port no. is used by FTP data (File Transfer (c) 443 (d) 1214
Protocol) service? 97. Which port no. is used by Windows Terminal
(a) 7 (b) 19 Server?
(c) 20 (d) 21 (a) 161 (b) 220
84. Which port no. is used by FTP control service? (c) 443 (d) 1214
(a) 7 (b) 19 98. Which port no. is used by pcAnywhere service?
(c) 20 (d) 21 (a) 5631 (b) 5632
85. Which port does SSH used? (c) Both a and b (d) None of above
(a) 22 (b) 23 99. Which port no. is used by Trinoo service?
(c) 25 (d) 37 (a) 27444 (b) 27665
86. Which port does SMTP (Simple Mail Transfer (c) 31335 (d) All of above
Protocol) used? 100. Which port no. is used by back office service?
(a) 22 (b) 23 (a) 31337 (b) 27444
(c) 25 (d) 37 (c) 27665 (d) 31335
87. Which port no. is used by Daytime service? 101. Banner Grabbing is an example of what?
(a) 22 (b) 23 (a) Foot printing
(c) 25 (d) 37 (b) Active operating system fingerprinting
88. Which port no. is used by TFTP (Trivial File (c) Passive operating system fingerprinting
Transfer Protocol) service? (d) Application analysis
(a) 53 (b) 69 102. Why would an attacker want to perform a scan port
(c) 79 (d) 80 no.137?
89. Which port no. is used by Finger service? (a) To check for file and print sharing on Windows
(a) 53 (b) 69 systems
(c) 79 (d) 80 (b) To discover proxy servers on a network
90. Which port does POP3 (Post Office Protocol (c) To discover a target system with the Net BIOS
version3) used? null session vulnerability
(a) 110 (b) 111 (d) To locate the FTP service on the target host
(c) 135 (d) 137 103. Banner grabbing is used for ______.
91. Which port does SUNRPC (remote procedure calls) (a) White Hat Hacking (b) Black Hat Hacking
used? (c) Grey Hat Hacking (d) Script Kiddies
(a) 110 (b) 111 104. Which tool is used for ping sweeps and port
(c) 135 (d) 137 scanning?
92. Which port does RPC/DCE end point map per for (a) Net cat (b) Sam Spade
Microsoft networks is used? (c) Super Scan (d) All the above
(a) 110 (b) 111 105. Which of the following tool is used for security
(c) 135 (d) 137 checks as port scanning and firewall testing?
93. Which port no. is used for Net BIOS over TCP/IP (a) Net cat (b) Nmap
service? (c) Data communication (d) Net scan
(a) 137 (b) 138 106. What is the most important activity in system
(c) 139 (d) All of above cracking?
94. Which port does SNMP (Simple Network (a) Information gathering(b) Cracking password
Management Protocol) used? (c) Escalating privileges (d) Covering tracks
(a) 161 (b) 220 107. Which Nmaps can is does not completely open a
(c) 443 (d) 1214 TCP connection?
95. Which port does IMAP (Internet Message Access (a) SYN stealth scan (b) TCP scan
Protocol) used? (c) XMAS trees can (d) ACK scan
(a) 161 (b) 220 108. Key loggers are form of ______.
(c) 443 (d) 1214 (a) Spy ware (b) Shoulder surfing
96. Which port no. is used by Microsoft SQL Server? (c) Trojan (d) Social engineering
(a) 161 (b) 220 109. Nmap is abbreviated as Network Mapper.
2.5
Physics Motion in One Dimension
(a) True (b) False 119. Why would a hacker use a proxy server?
110. ______is a popular tool used for discovering (a) To create a stronger connection with the target
network as well as security auditing. (b) To create a ghost server on the network
(a) Ettercap (b) Metasploit (c) To obtain are mote access connection
(c) Nmap (d) Burp Suit (d) To hide malicious activity on the network
111. Which of this Nmap do not check? 120. Sniffing is used to perform ______finger printing.
(a) Services different hosts are offering. (a) Passive stack (b) Active stack
(b) On what OS they are running. (c) Passive banner grabbing
(c) What kind of firewall in use? (d) Scanned
(d) What type of antivirus in use? 121. Services running on a system are determined by
112. What is purpose of Denial of Service attacks? ______.
(a) Exploit weakness in TCP/IP attack (a) The system’s IP address
(b) To execute a Trojan horse on a system (b) The Active Directory
(c) To overload a system so it is no longer (c) The system’s network name
operational (d) The port assigned
(d) To shutdown services by turning them off 122. What are the types of scanning?
113. What are the some of the most common (a) Port, network, and services
vulnerabilities that exist in a network system? (b) Network, vulnerability, and port
(a) Changing manufacturer, or recommended (c) Passive, active, and interactive
settings of newly installed application
(d) Server, client, and network
(b) Additional un used feature on commercials of
123. Enumeration is part of what phase of ethical
ware package
hacking?
(c) Utilizing open source application code
(a) Reconnaissance (b) Maintaining Access
(d) Balancing security and ease of use of system
(c) Gaining Access (d) Scanning
114. Which of the following is not a characteristic of
124. ______ framework made cracking of vulnerabilities
ethical hacker?
easy like point and click.
(a) Excellent knowledge of Windows
(a) Net (b) Metasploit
(b) Understands the process of exploiting network
(c) Zeus (d) Ettercap
vulnerabilities
125. ______is a popular IP address and port scanner.
(c) Patience, persistence and perseverance
(a) Cain and Abel (b) Snort
(d) Has the highest level of security for the
organization (c) Angry IP Scanner (d) Ettercap
115. The first phase of hacking an IT system is 126. ______is a popular tool used for network analysis in
compromise of which foundation of security? multi protocol diverse network.
(a) Availability (b) Confidentiality (a) Snort (b) Super Scan
(c) Integrity (d) Authentication (c) Burp Suit (d) EtterPeak
116. What are the port states determined by Nmap? 127. ______ scans TCP ports and resolves different host
names.
(a) Active, inactive, standby
(a) SuperScan (b) Snort
(b) Open, half-open, closed
(c) Ettercap (d) QualysGuard
(c) Open, filtered, unfiltered
128. What tool can be used to perform SNMP
(d) Active, closed, unused
enumeration?
117. Which of the following will allow foot printing to be
(a) DNS lookup (b) Whois
conducted without detection?
(c) Ns look up (d) IP Network Browser
(a) Ping Sweep (b) Trace route
129. Wires harkisa ______tool.
(c) War Dialers (d) ARIN
(a) Network protocol analysis
118. Performing hacking activities with the intent on
gaining visibility for an un fair situation is (b) Network connection security
called______. (c) Connection analysis
(a) Cracking (b) Analysis (d) Defending malicious packet-filtering
(c) Hacktivism (d) Exploitation 130. Air cracking is used for______.
2.6
Physics Motion in One Dimension
2.7
Physics Motion in One Dimension
1. (a) 2. (c) 3. (d) 4. (d) 5. (c) 6. (d) 7. (c) 8. (d) 9. (b) 10. (b)
11. (a) 12. (a) 13. (a) 14. (d) 15. (d) 16. (c) 17. (a) 18. (d) 19. (c) 20. (a)
21. (d) 22. (d) 23. (c) 24. (c) 25. (d) 26. (c) 27. (c) 28. (a) 29. (b) 30. (d)
31. (a) 32. (a) 33. (c) 34. (c) 35. (d) 36. (a) 37. (b) 38. (d) 39. (a) 40. (d)
41. (d) 42. (a) 43. (a) 44. (b) 45. (c) 46. (d) 47. (a) 48. (b) 49. (d) 50. (c)
51. (a) 52. (b) 53. (d) 54. (a) 55. (d) 56. (c) 57. (a) 58. (c) 59. (b) 60. (b)
61. (a) 62. (d) 63. (c) 64. (b) 65. (a) 66. (d) 67. (d) 68. (a) 69. (d) 70. (a)
71. (a) 72. (c) 73. (c) 74. (b) 75. (a) 76. (c) 77. (c) 78. (a) 79. (c) 80. (c)
81. (a) 82. (b) 83. (c) 84. (d) 85. (a) 86. (c) 87. (d) 88. (b) 89. (c) 90. (a)
91. (b) 92. (c) 93. (d) 94. (a) 95. (b) 96. (d) 97. (c) 98. (c) 99. (d) 100. (a)
101. (c) 102. (c) 103. (a) 104. (c) 105. (a) 106. (b) 107. (a) 108. (a) 109. (a) 110. (c)
111. (d) 112. (c) 113. (b) 114. (d) 115. (b) 116. (c) 117. (d) 118. (c) 119. (a) 120. (a)
121. (d) 122. (b) 123. (c) 124. (b) 125. (c) 126. (d) 127. (a) 128. (d) 129. (a) 130. (b)
131. (c) 132. (a) 133. (a) 134. (a) 135. (a) 136. (a) 137. (d) 138. (a) 139. (b) 140. (a)
141. (b) 142. (a) 143. (d) 144. (c) 145. (d)
ANSWER KEY
2.8