Documente Academic
Documente Profesional
Documente Cultură
Answer: a Answer: a
Explanation: CHAP stands for Challenge Handshake authentication
protocol. Features of CHAP: plaintext, memorized token. Protocol uses 1. Why would a hacker use a proxy server?
Telnet, HTTP. A. To create a stronger connection with the target.
8. Security features that control that can access resources in the OS. B. To create a ghost server on the network.
a) Authentication C. To obtain a remote access connection.
b) Identification D. To hide malicious activity on the network.
c) Validation Correct Answer – D
d) Access control Explanation – Proxy servers exist to act as an intermediary between the
View Answer hacker and the target and servces to keep the hacker anonymous tot he
Answer: d network.
Explanation: Access control refers to the security features. Applications 2. What type of symmetric key algorithm using a streaming cipher to
call access control to provide resources. encrypt information?
9. An algorithm in encryption is called _____________ A. RC4
a) Algorithm B. Blowfish
b) Procedure C. SHA
c) Cipher D. MD5
d) Module
View Answer Correct Answer – A
Explanation – RC$ uses streaming ciphers.
Answer: c
Explanation: An algorithm used in encryption is referred to as a cipher. 3. Which of the following is not a factor in securing the environment
cipher is an algorithm for performing encryption or decryption against an attack on security?
A. The education of the attacker Windows 2000 LDAP client uses port 389 to connect to the Active
B. The system configuration Directory service.
C. The network architecture
D. The business strategy of the company 6. To hide information inside a picture, what technology is used?
E. The level of access provided to employees A. Rootkits
Correct Answer – D B. Bitmapping
Explanation – All of the answers are factors supporting the exploitation C. Steganography
or prevention of an attack. The business strategy may provide the D. Image Rendering
motivation for a potential attack, but by itself will not influence the Correct Answer – C
outcome. Explanation – Steganography is the right answer and can be used to hide
4. What type of attack uses a fraudulent server with a relay address? information in pictures, music, or videos.
9. Which Federal Code applies the consequences of hacking activities Correct Answer – A
that disrupt subway transit systems? Explanation – SX is used to identify a xmas scan, while sneaky performs
scans 15 seconds apart.
A. Electronic Communications Interception of Oral Communications
B. 18 U.S.C. § 1029 12. What type of rootkit will patch, hook, or replace the version of
C. Cyber Security Enhancement Act 2002 system call in order to hide information?
D. 18 U.S.C. § 1030
A. Library level rootkits
Correct Answer – C B. Kernel level rootkits
Explanation – The Cyber Security Enhancement Act 2002 deals with life C. System level rootkits
sentences for hackers who recklessly endanger the lives of others, D. Application level rootkits
specifically transportation systems.
Correct Answer – A
10. Which of the following is not a typical characteristic of an ethical Explanation – Library leve rootkits is the correct answer. Kerel level
hacker? focuses on replaceing specific code while application level will
concentrate on modifying the behavior of the application or replacing
A. Excellent knowledge of Windows.
application binaries. The type, system level, does not exist for rootkits.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance. 13. What is the purpose of a Denial of Service attack?
D. Has the highest level of security for the organization.
A. Exploit a weakness in the TCP/IP stack
Correct Answer – D B. To execute a Trojan on a system
Explanation – Each answer has validity as a characteristic of an ethical C. To overload a system so it is no longer operational
hacker. Though having the highest security clearance is ideal, it is not D. To shutdown services by turning them off
always the case in an organization.
Correct Answer – C 16. What tool can be used to perform SNMP enumeration?
Explanation – DoS attacks force systems to stop responding by
overloading the processing of the system. A. DNSlookup
B. Whois
14. What are some of the most common vulnerabilities that exist in a C. Nslookup
network or system? D. IP Network Browser
26. A packet with no flags set is which type of scan? A. To identify proxy servers
B. Web activity is not scanned
A. TCP
C. To bypass a firewall
B. XMAS D. HTTP is a easy protocol to work with
C. IDLE
D. NULL Correct Answer – C
Explanation – HTTP Tunneling is used to bypass the IDS and firewalls
Correct Answer – D
present on a network.
Explanation – A NULL scan has no flags set.
30. Which Nmap scan is does not completely open a TCP connection?
27. Sniffing is used to perform ______________ fingerprinting.
A. SYN stealth scan
A. Passive stack B. TCP connect
B. Active stack C. XMAS tree scan
C. Passive banner grabbing
D. ACK scan
D. Scanned
Correct Answer – A
Correct Answer – A Explanation – Also known as a “half-open scanning,” SYN stealth scan will
Explanation – Passive stack fingerprinting uses sniffing technologies not complete a full TCP connection.
instead of scanning.
31. What protocol is the Active Directory database based on?
28. Phishing is a form of ____________________.
A. LDAP
B. TCP
C. SQL Correct Answer – C
D. HTTP Explanation – Enumeration is a process of gaining access to the network
by obtaining information on a user or system to be used during an attack.
Correct Answer – A
Explanation – Active4 direction in Windows 200 is based on a Lightweight 35. Keyloggers are a form of ______________.
Directory Access Protocol (LDAP).
A. Spyware
32. Services running on a system are determined by _____________. B. Shoulder surfing
C. Trojan
A. The system’s IP address.
D. Social engineering
B. The Active Directory
C. The system’s network name Correct Answer – A
D. The port assigned Explanation – Keyloggers are a form of hardware or software spyware
installed between the keyboard and operating system.
Correct Answer – D
Explanation – Hackers can identify services running on a system by the 36. What are hybrid attacks?
open ports that are found.
A. An attempt to crack passwords using words that can be found in
33. What are the types of scanning? dictionary.
B. An attempt to crack passwords by replacing characters of a dictionary
A. Port, network, and services word with numbers and symbols.
B. Network, vulnerability, and port C. An attempt to crack passwords using a combination of characters,
C. Passive, active, and interactive numbers, and symbols.
D. Server, client, and network D. An attempt to crack passwords by replacing characters with numbers
Correct Answer – B and symbols.
Explanation – The three types of accepted scans are port, network, and Correct Answer – B
vulnerability. Explanation – Hybrid attacks do crack passwords that are created with
34. Enumeration is part of what phase of ethical hacking? replaced characters of dictionary type words.
A. Threat A) 20
B. Attack B) 27
C. Exploit C) 80
D. Vulnerability D) 87
Correct Answer – C 2. What is the maximum character Linux supports in its filenames?
Explanation – A weakness in security is exploited. An attack does the
exploitation. A weakness is vulnerability. A threat is a potential A) 8
B) 128
vulnerability.
C) 256
39. Which database is queried by Whois? D) Unlimited
7. Charles Babbage invented 12. The way of manipulating data into information is called as?
A) ENIAC A) Storing
B) Difference Engine B) Processing
C) Electronic Computer C) Deletion
D) Punched Card D) Organizing
9. Which was the first ever web server software? 14. Surgeons can perform delicate operations by manipulating devices
through computers instead of manually. This technology is known as:
A) GWS
B) IIS 5.0 A) Robotics
C) CERN httpd B) Computer Forensics
D) nginx C) Simulation
D) Forecasting
15. In the binary language each letter of the alphabet, each number and A) Start ()
each special character is made up of a unique combination of: B) system ()
C) main ()
A) Eight Bytes
D) program ()
B) Eight Kilobytes
C) Eight Characters 19. Which of the following is the boolean operator for logical-and?
D) Eight Bits
A) &
16. What will be the output if you will compile and execute the B) &&
following code? C) |
#include D) |&
int main(){
register int i,x; 20. What punctuation ends most lines of C++ code?
scanf(“%d”,&i); A) (Dot)
x=++i + ++i + ++i; B) (semi-colon)
printf(“%d”,x); C) (colon)
return 0; D) (single quote)
}
21. A script is a
A) 17
B) 18 A) Program or sequence of instructions that is interpreted or carried out
C) 21 by processor directly
D) Compiler Error B) Program or sequence of instruction that is interpreted or carried out
by another program
17. The ability to recover and read deleted or damaged files from a C) Program or sequence of instruction that is interpreted or carried out by
criminals computer is an example of a law enforcement specialty called? web server only
A) Robotics D) None of above
B) Simulation 22. Examine the following program and determine the output
C) Computer Forensics #include
D) Animation using namespace std;
int operate (int a, int b)
18. What is the only function all C++ programs must contain?
{
return (a * b); C) first address
} D) base address
float operate (float a, float b)
{ 25. Two dimensional arrays are also called
return (a/b); A) tables arrays
} B) matrix arrays
int main() C) both of above
{ D) none of above
int x=5, y=2;
float n=5.0, m=2.0; 26. How many steps are in the systems development life cycle (SDLC)?
cout << operate(x,y) <<“\t”;
A) 4
cout << operate (n,m);
B) 5
return 0;
C) 6
}
D) 10
A) 10.0 5.0
27. A protocol is a set of rules governing a time sequence of events that
B) 5.0 2.5
must take place
C) 10.0 5
D) 10 2.5 A) between peers
B) between an interface
23. The following piece of script will output:
C) between modems
<? $email=’admin@yeahhub.com’; $new=strstr($email, ‘@’ ; print
D) across an interface
$new; ?>
28. In OSI network architecture, the dialogue control and token
A) admin
management are responsibility of
B) admin@yeahhub
C) @yeahhub.com A) session layer
D) Yeahhub.com B) network layer
C) transport layer
24. The memory address of the first element of an array is called
D) data link layer
A) floor address E) none of above
B) foundation address
29. Which of the following signal is not standard RS-232-C signal?
A) VDR 34. When following piece of code is executed, what happens?
B) RTS b = 3;
C) CTS a = b++;
D) DSR
A) a contains 3 and b contains 4
30. Microprocessor 8085 can address location upto B) a contains 4 and b contains 4
C) a contains 4 and b contains 3
A) 32K
D) a contains 3 and b contains 3
B) 128K
C) 64K 35. Consider the following two pieces of codes and choose the best
D) 1M answer
Code 1:
31. The main purpose of data protection act is to switch (x) {
A) Protect personal privacy case 1:
B) Prevent Viruses cout <<”x is 1”;
C) Increase the security of computer systems break;
D) Reduce Project Failures case 2:
cout <<”x is 2”;
32. Which of the following is false for switch statement in C++? break;
default:
A) It uses labels instead of blocks
cout <<”value of x unknown”;
B) We need to put break statement at the end of the group of statement
}
of a condition
Code 2:
C) We can put range for case such as case 1..3
If (x==1){
D) None of above
Cout <<”x is 1”;
33. To increase the value of c by one which of the following statement is }
wrong? Else if (x==2){
Cout << “x is 2”;
A) c++; }
B) c = c + 1; Else{
C) c + 1 => c; Cout <<”value of x unknown”;
D) c += 1 }
A) Both of the above code fragments have the same behaviour Answer: c
B) Both of the above code fragments produce different effects Explanation: None.
C) The first code produces more results than second
4. In cryptography, the order of the letters in a message is rearranged by
D) The second code produces more results than first.
a) transpositional ciphers
1. In cryptography, what is cipher? b) substitution ciphers
a) algorithm for performing encryption and decryption c) both transpositional ciphers and substitution ciphers
b) encrypted message d) none of the mentioned
c) both algorithm for performing encryption and decryption and View Answer
encrypted message
d) none of the mentioned Answer: a
View Answer Explanation: None.
Answer: b
Explanation: None.
Answer: a
Explanation: None
Answer: b
Explanation: None.