Sunteți pe pagina 1din 15

1. The field that covers a variety of computer networks, both public and 4. Which of these is a part of network identification?

private, that are used in everyday jobs. a) UserID


a) Artificial Intelligence b) Password
b) ML c) OTP
c) Network Security d) fingerprint
d) IT View Answer
View Answer
Answer: a
Answer: c Explanation: The answer is UserID. UserID is a part of identification.
Explanation: Network security covers a variety of computer networks, UserID can be a combination of username, user student number etc.
both private and public. Everyday jobs like conducting transactions and
communications among business and government agencies etc. 5. The process of verifying the identity of a user.
a) Authentication
2. Network Security provides authentication and access control for b) Identification
resources. c) Validation
a) True d) Verification
b) False View Answer
View Answer
Answer: a
Answer: a Explanation: It is called an authentication. It is typically based on
Explanation: The statement is true. AFS is an example. It helps us protect passwords, smart card, fingerprint, etc.
vital information.
6. A concern of authentication that deals with user rights.
3. Which is not an objective of network security? a) General access
a) Identification b) Functional authentication
b) Authentication c) Functional authorization
c) Access control d) Auto verification
d) Lock View Answer
View Answer
Answer: c
Answer: d Explanation: Functional authorization is concerned with individual user
Explanation: The Identification, Authentication and Access control are the rights. Authorization is the function of specifying access rights to
objectives of network security. There is no such thing called lock. resources related to information security.
7. CHAP stands for? 10. The information that gets transformed in encryption is ____________
a) Challenge Handshake authentication protocol a) Plain text
b) Challenge Hardware authentication protocol b) Parallel text
c) Circuit Hardware authentication protocol c) Encrypted text
d) Circuit Handshake authentication protocol d) Decrypted text
View Answer View Answer

Answer: a Answer: a
Explanation: CHAP stands for Challenge Handshake authentication
protocol. Features of CHAP: plaintext, memorized token. Protocol uses 1. Why would a hacker use a proxy server?
Telnet, HTTP. A. To create a stronger connection with the target.
8. Security features that control that can access resources in the OS. B. To create a ghost server on the network.
a) Authentication C. To obtain a remote access connection.
b) Identification D. To hide malicious activity on the network.
c) Validation Correct Answer – D
d) Access control Explanation – Proxy servers exist to act as an intermediary between the
View Answer hacker and the target and servces to keep the hacker anonymous tot he
Answer: d network.
Explanation: Access control refers to the security features. Applications 2. What type of symmetric key algorithm using a streaming cipher to
call access control to provide resources. encrypt information?
9. An algorithm in encryption is called _____________ A. RC4
a) Algorithm B. Blowfish
b) Procedure C. SHA
c) Cipher D. MD5
d) Module
View Answer Correct Answer – A
Explanation – RC$ uses streaming ciphers.
Answer: c
Explanation: An algorithm used in encryption is referred to as a cipher. 3. Which of the following is not a factor in securing the environment
cipher is an algorithm for performing encryption or decryption against an attack on security?
A. The education of the attacker Windows 2000 LDAP client uses port 389 to connect to the Active
B. The system configuration Directory service.
C. The network architecture
D. The business strategy of the company 6. To hide information inside a picture, what technology is used?
E. The level of access provided to employees A. Rootkits
Correct Answer – D B. Bitmapping
Explanation – All of the answers are factors supporting the exploitation C. Steganography
or prevention of an attack. The business strategy may provide the D. Image Rendering
motivation for a potential attack, but by itself will not influence the Correct Answer – C
outcome. Explanation – Steganography is the right answer and can be used to hide
4. What type of attack uses a fraudulent server with a relay address? information in pictures, music, or videos.

A. NTLM 7. Which phase of hacking performs actual attack on a network or


B. MITM system?
C. NetBIOS A. Reconnaissance
D. SMB B. Maintaining Access
Correct Answer – B C. Scanning
Explanation – MITM (Man in the Middle) attacks create a server with a D. Gaining Access
relay address. It is used in SMB relay attacks. Correct Answer – D
Explanation – In the process of hacking, actual attacks are performed
5. What port is used to connect to the Active Directory in Windows
when gaining access, or ownership, of the network or
2000?
system. Reconnaissance and Scanning are information gathering steps to
A. 80 identify the best possible action for staging the attack. Maintaining access
B. 445 attempts to prolong the attack.
C. 139
8. Attempting to gain access to a network using an employee’s
D. 389
credentials is called the _____________ mode of ethical hacking.
Correct Answer – D
Explanation – The Active Directory Administration Tool used for a A. Local networking
B. Social engineering
C. Physical entry 11. What is the proper command to perform an Nmap XMAS scan every
D. Remote networking 15seconds?

Correct Answer – A A. nmap -sX -sneaky


Explanation – Local networking uses an employee’s credentials, or access B. nmap -sX -paranoid
rights, to gain access to the network. Physical entry uses credentials to C. nmap -sX -aggressive
gain access to the physical IT infrastructure. D. nmap -sX -polite

9. Which Federal Code applies the consequences of hacking activities Correct Answer – A
that disrupt subway transit systems? Explanation – SX is used to identify a xmas scan, while sneaky performs
scans 15 seconds apart.
A. Electronic Communications Interception of Oral Communications
B. 18 U.S.C. § 1029 12. What type of rootkit will patch, hook, or replace the version of
C. Cyber Security Enhancement Act 2002 system call in order to hide information?
D. 18 U.S.C. § 1030
A. Library level rootkits
Correct Answer – C B. Kernel level rootkits
Explanation – The Cyber Security Enhancement Act 2002 deals with life C. System level rootkits
sentences for hackers who recklessly endanger the lives of others, D. Application level rootkits
specifically transportation systems.
Correct Answer – A
10. Which of the following is not a typical characteristic of an ethical Explanation – Library leve rootkits is the correct answer. Kerel level
hacker? focuses on replaceing specific code while application level will
concentrate on modifying the behavior of the application or replacing
A. Excellent knowledge of Windows.
application binaries. The type, system level, does not exist for rootkits.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance. 13. What is the purpose of a Denial of Service attack?
D. Has the highest level of security for the organization.
A. Exploit a weakness in the TCP/IP stack
Correct Answer – D B. To execute a Trojan on a system
Explanation – Each answer has validity as a characteristic of an ethical C. To overload a system so it is no longer operational
hacker. Though having the highest security clearance is ideal, it is not D. To shutdown services by turning them off
always the case in an organization.
Correct Answer – C 16. What tool can be used to perform SNMP enumeration?
Explanation – DoS attacks force systems to stop responding by
overloading the processing of the system. A. DNSlookup
B. Whois
14. What are some of the most common vulnerabilities that exist in a C. Nslookup
network or system? D. IP Network Browser

A. Changing manufacturer, or recommended, settings of a newly installed Correct Answer – D


application. Explanation – SNMPUtil and IP Network Browser is SNMP enumeration
B. Additional unused features on commercial software packages. tool
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a 17. Which ports should be blocked to prevent null session enumeration?
system. A. Ports 120 and 445
Correct Answer – B B. Ports 135 and 136
Explanation – Linux is an open source code and considered to have C. Ports 110 and 137
greater security than the commercial Windows environment. Balancing D. Ports 135 and 139
security. Ease of use and functionality can open vulnerabilities that Correct Answer – D
already exist. Manufacturer settings, or default settings, may provide Explanation – Port 139 is the NetBIOS Session port typically can provide
basic protection against hacking threats, but need to change to provide large amounts of information using APIs to connect to the system. Other
advance support. The unused features of application code provide an ports that can be blocked in 135, 137,138, and 445.
excellent opportunity to attack and cover the attack.
18. The first phase of hacking an IT system is compromise of which
15. What is the sequence of a TCP connection? foundation of security?
A. SYN-ACK-FIN A. Availability
B. SYN-SYN ACK-ACK B. Confidentiality
C. SYN-ACK C. Integrity
D. SYN-SYN-ACK D. Authentication
Correct Answer – B Correct Answer – B
Explanation – A three-handed connection of TCP will start with a SYN Explanation – Reconnaissance is about gathering confidential
packet followed by a SYN-ACK packet. A final ACK packet will complete information, such as usernames and passwords.
the connection.
19. How is IP address spoofing detected? 22. What port does Telnet use?

A. Installing and configuring a IDS that can read the IP header A. 22


B. Comparing the TTL values of the actual and spoofed addresses B. 80
C. Implementing a firewall to the network C. 20
D. Identify all TCP sessions that are initiated but does not complete D. 23
successfully
Correct Answer – D
Correct Answer – B Explanation – Telnet uses port 23.
Explanation – IP address spoofing is detectable by comparing TTL values
23. Which of the following will allow footprinting to be conducted
of the actual and spoofed IP addresses
without detection?
20. Why would a ping sweep be used?
A. PingSweep
A. To identify live systems B. Traceroute
B. To locate live systems C. War Dialers
C. To identify open ports D. ARIN
D. To locate firewalls
Correct Answer – D
Correct Answer – A Explanation – ARIN is a publicly accessible database, which has
Explanation – A ping sweep is intended to identify live systems. Once an information that could be valuable. Because it is public, any attempt to
active system is found on the network, other information may be obtain information in the database would go undetected.
distinguished, including location. Open ports and firewalls.
24. Performing hacking activities with the intent on gaining visibility for
21. What are the port states determined by Nmap? an unfair situation is called ________.

A. Active, inactive, standby A. Cracking


B. Open, half-open, closed B. Analysis
C. Open, filtered, unfiltered C. Hacktivism
D. Active, closed, unused D. Exploitation

Correct Answer – C Correct Answer – C


Explanation – Nmap determines that ports are open, filtered, or Explanation – Hacktivism is the act of malicious hacking for a cause or
unfiltered. purpose.
25. What is the most important activity in system hacking? A. Spamming
B. Identify Theft
A. Information gathering C. Impersonation
B. Cracking passwords
D. Scanning
C. Escalating privileges
D. Covering tracks Correct Answer – C
Explanation – Phishing is typically a potential attacker posing, or
Correct Answer – B
impersonating, a financial institution
Explanation – Passwords are a key component to access a system, making
cracking the password the most important part of system hacking. 29. Why would HTTP Tunneling be used?

26. A packet with no flags set is which type of scan? A. To identify proxy servers
B. Web activity is not scanned
A. TCP
C. To bypass a firewall
B. XMAS D. HTTP is a easy protocol to work with
C. IDLE
D. NULL Correct Answer – C
Explanation – HTTP Tunneling is used to bypass the IDS and firewalls
Correct Answer – D
present on a network.
Explanation – A NULL scan has no flags set.
30. Which Nmap scan is does not completely open a TCP connection?
27. Sniffing is used to perform ______________ fingerprinting.
A. SYN stealth scan
A. Passive stack B. TCP connect
B. Active stack C. XMAS tree scan
C. Passive banner grabbing
D. ACK scan
D. Scanned
Correct Answer – A
Correct Answer – A Explanation – Also known as a “half-open scanning,” SYN stealth scan will
Explanation – Passive stack fingerprinting uses sniffing technologies not complete a full TCP connection.
instead of scanning.
31. What protocol is the Active Directory database based on?
28. Phishing is a form of ____________________.
A. LDAP
B. TCP
C. SQL Correct Answer – C
D. HTTP Explanation – Enumeration is a process of gaining access to the network
by obtaining information on a user or system to be used during an attack.
Correct Answer – A
Explanation – Active4 direction in Windows 200 is based on a Lightweight 35. Keyloggers are a form of ______________.
Directory Access Protocol (LDAP).
A. Spyware
32. Services running on a system are determined by _____________. B. Shoulder surfing
C. Trojan
A. The system’s IP address.
D. Social engineering
B. The Active Directory
C. The system’s network name Correct Answer – A
D. The port assigned Explanation – Keyloggers are a form of hardware or software spyware
installed between the keyboard and operating system.
Correct Answer – D
Explanation – Hackers can identify services running on a system by the 36. What are hybrid attacks?
open ports that are found.
A. An attempt to crack passwords using words that can be found in
33. What are the types of scanning? dictionary.
B. An attempt to crack passwords by replacing characters of a dictionary
A. Port, network, and services word with numbers and symbols.
B. Network, vulnerability, and port C. An attempt to crack passwords using a combination of characters,
C. Passive, active, and interactive numbers, and symbols.
D. Server, client, and network D. An attempt to crack passwords by replacing characters with numbers
Correct Answer – B and symbols.
Explanation – The three types of accepted scans are port, network, and Correct Answer – B
vulnerability. Explanation – Hybrid attacks do crack passwords that are created with
34. Enumeration is part of what phase of ethical hacking? replaced characters of dictionary type words.

A. Reconnaissance 37. Which form of encryption does WPA use?


B. Maintaining Access A. Shared key
C. Gaining Access B. LEAP
D. Scanning
C. TKIP A. Web-based
D. AES B. Human-based
C. User-based
Correct Answer – C
D. Computer-based
Explanation – TKIP is used by WPA
Correct Answer – D
38. What is the best statement for taking advantage of a weakness in
the security of an IT system? 1. What is the default port number for Apache and most web servers?

A. Threat A) 20
B. Attack B) 27
C. Exploit C) 80
D. Vulnerability D) 87

Correct Answer – C 2. What is the maximum character Linux supports in its filenames?
Explanation – A weakness in security is exploited. An attack does the
exploitation. A weakness is vulnerability. A threat is a potential A) 8
B) 128
vulnerability.
C) 256
39. Which database is queried by Whois? D) Unlimited

A. ICANN 3. A DNS translates a domain name into what?


B. ARIN
C. APNIC A) Binary
B) Hex
D. DNS
C) IP
Correct Answer – A D) URL
Explanation – Who utilizes the Internet Corporation for Assigned Names
and Numbers. 4. Which of the following is not an example of Operating system?

40. Having individuals provide personal information to obtain a free A) Windows 98


offer provided through the Internet is considered what type of social B) BSD Unix
C) Microsoft Office XP
engineering?
D) Red Hat Linux
5. What do you press to enter the current date in a cell? 10. Who is known as the Father of the Java Programming language?

A) CTRL + ; (Semicolon) A) Bill Board


B) CTRL + Shift + : (Colon) B) James Gosling
C) CTRL + F10 C) Jame Smith
D) CTRL + F11 D) Sabeer Bhatia

6. An Octal number 237 is equal to the binary number 11. Java is a?

A) 011 011 111 A) Compiler


B) 010 111 011 B) Operating System
C) 010 011 111 C) Input Device
D) 011 000 001 D) Programming Language

7. Charles Babbage invented 12. The way of manipulating data into information is called as?

A) ENIAC A) Storing
B) Difference Engine B) Processing
C) Electronic Computer C) Deletion
D) Punched Card D) Organizing

8. Which was the First Web browser? 13. What is CGI?

A) Worldwideweb A) Computed Gateway Interface


B) Netscape Navigator B) Compliant Gateway Interface
C) Internet Explorer C) Case Gateway Interface
D) Safari D) Common Gateway Interface

9. Which was the first ever web server software? 14. Surgeons can perform delicate operations by manipulating devices
through computers instead of manually. This technology is known as:
A) GWS
B) IIS 5.0 A) Robotics
C) CERN httpd B) Computer Forensics
D) nginx C) Simulation
D) Forecasting
15. In the binary language each letter of the alphabet, each number and A) Start ()
each special character is made up of a unique combination of: B) system ()
C) main ()
A) Eight Bytes
D) program ()
B) Eight Kilobytes
C) Eight Characters 19. Which of the following is the boolean operator for logical-and?
D) Eight Bits
A) &
16. What will be the output if you will compile and execute the B) &&
following code? C) |
#include D) |&
int main(){
register int i,x; 20. What punctuation ends most lines of C++ code?
scanf(“%d”,&i); A) (Dot)
x=++i + ++i + ++i; B) (semi-colon)
printf(“%d”,x); C) (colon)
return 0; D) (single quote)
}
21. A script is a
A) 17
B) 18 A) Program or sequence of instructions that is interpreted or carried out
C) 21 by processor directly
D) Compiler Error B) Program or sequence of instruction that is interpreted or carried out
by another program
17. The ability to recover and read deleted or damaged files from a C) Program or sequence of instruction that is interpreted or carried out by
criminals computer is an example of a law enforcement specialty called? web server only
A) Robotics D) None of above
B) Simulation 22. Examine the following program and determine the output
C) Computer Forensics #include
D) Animation using namespace std;
int operate (int a, int b)
18. What is the only function all C++ programs must contain?
{
return (a * b); C) first address
} D) base address
float operate (float a, float b)
{ 25. Two dimensional arrays are also called
return (a/b); A) tables arrays
} B) matrix arrays
int main() C) both of above
{ D) none of above
int x=5, y=2;
float n=5.0, m=2.0; 26. How many steps are in the systems development life cycle (SDLC)?
cout << operate(x,y) <<“\t”;
A) 4
cout << operate (n,m);
B) 5
return 0;
C) 6
}
D) 10
A) 10.0 5.0
27. A protocol is a set of rules governing a time sequence of events that
B) 5.0 2.5
must take place
C) 10.0 5
D) 10 2.5 A) between peers
B) between an interface
23. The following piece of script will output:
C) between modems
<? $email=’admin@yeahhub.com’; $new=strstr($email, ‘@’ ; print
D) across an interface
$new; ?>
28. In OSI network architecture, the dialogue control and token
A) admin
management are responsibility of
B) admin@yeahhub
C) @yeahhub.com A) session layer
D) Yeahhub.com B) network layer
C) transport layer
24. The memory address of the first element of an array is called
D) data link layer
A) floor address E) none of above
B) foundation address
29. Which of the following signal is not standard RS-232-C signal?
A) VDR 34. When following piece of code is executed, what happens?
B) RTS b = 3;
C) CTS a = b++;
D) DSR
A) a contains 3 and b contains 4
30. Microprocessor 8085 can address location upto B) a contains 4 and b contains 4
C) a contains 4 and b contains 3
A) 32K
D) a contains 3 and b contains 3
B) 128K
C) 64K 35. Consider the following two pieces of codes and choose the best
D) 1M answer
Code 1:
31. The main purpose of data protection act is to switch (x) {
A) Protect personal privacy case 1:
B) Prevent Viruses cout <<”x is 1”;
C) Increase the security of computer systems break;
D) Reduce Project Failures case 2:
cout <<”x is 2”;
32. Which of the following is false for switch statement in C++? break;
default:
A) It uses labels instead of blocks
cout <<”value of x unknown”;
B) We need to put break statement at the end of the group of statement
}
of a condition
Code 2:
C) We can put range for case such as case 1..3
If (x==1){
D) None of above
Cout <<”x is 1”;
33. To increase the value of c by one which of the following statement is }
wrong? Else if (x==2){
Cout << “x is 2”;
A) c++; }
B) c = c + 1; Else{
C) c + 1 => c; Cout <<”value of x unknown”;
D) c += 1 }
A) Both of the above code fragments have the same behaviour Answer: c
B) Both of the above code fragments produce different effects Explanation: None.
C) The first code produces more results than second
4. In cryptography, the order of the letters in a message is rearranged by
D) The second code produces more results than first.
a) transpositional ciphers
1. In cryptography, what is cipher? b) substitution ciphers
a) algorithm for performing encryption and decryption c) both transpositional ciphers and substitution ciphers
b) encrypted message d) none of the mentioned
c) both algorithm for performing encryption and decryption and View Answer
encrypted message
d) none of the mentioned Answer: a
View Answer Explanation: None.

Answer: a 5. What is data encryption standard (DES)?


a) block cipher
Explanation: None.
b) stream cipher
2. In asymmetric key cryptography, the private key is kept by c) bit cipher
a) sender d) none of the mentioned
b) receiver View Answer
c) sender and receiver
d) all the connected devices to the network Answer: a
View Answer Explanation: None.

Answer: b 6. Cryptanalysis is used


a) to find some insecurity in a cryptographic scheme
Explanation: None.
b) to increase the speed
3. Which one of the following algorithm is not used in asymmetric-key c) to encrypt the data
cryptography? d) none of the mentioned
a) rsa algorithm View Answer
b) diffie-hellman algorithm
c) electronic code book algorithm Answer: a
d) none of the mentioned Explanation: None.
View Answer
7. Which one of the following is a cryptographic protocol used to secure b) variable size bit string
HTTP connection? c) both fixed size bit string and variable size bit string
a) stream control transmission protocol (SCTP) d) none of the mentioned
b) transport layer security (TSL) View Answer
c) explicit congestion notification (ECN)
d) resource reservation protocol Answer: a
View Answer

Answer: b
Explanation: None.

8. Voice privacy in GSM cellular telephone protocol is provided by


a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
View Answer

Answer: a
Explanation: None

9. ElGamal encryption system is


a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) none of the mentioned
View Answer

Answer: b
Explanation: None.

10. Cryptographic hash function takes an arbitrary block of data and


returns
a) fixed size bit string

S-ar putea să vă placă și