SIT384 - MCQ Flashcards
____ takes penetration testing to a higher level.
a. Hacking c. Security testing
b. Cracking d. Packet sniffing
c. Security testing
The International Council of Electronic Commerce Consultants (EC-Council) has
developed a certification designation called ____.
a. CompTIA Security+
b. OSSTMM Professional Security Tester (OPST)
c. Certified Information Systems Security Professional (CISSP)
d. Certified Ethical Hacker (CEH)
d. Certified Ethical Hacker (CEH)
In the TCP/IP stack, the ____ layer is concerned with controlling the flow of data,
sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP
header.
a. Internet c. Transport
b. Network d. Application
c. Transport
In the TCP/IP stack, the ____ layer uses IP addresses to route packets.
a. Internet c. Transport
b. Network d. Application
a. Internet
A(n) ____ is the logical, not physical, component of a TCP connection.
a. ISN c. port
b. socket d. SYN
c. port
The SMTP service uses port ____.
a. 25 c. 69
b. 53 d. 80
a. 25
A ____ can replicate itself, usually through an executable program attached to an e-mail.
a. shell c. keylogger
b. virus d. rootkit
b. virus
A ____ is a computer program that replicates and propagates itself without having to
attach itself to a host.
a. virus c. worm
b. Trojan d. shell
c. worm
PKI stands for ____.
a. Public Key Infrastructure c. Protected Key Infrastructure
b. Private Key Infrastructure d. Primary Key Infrastructure
a. Public Key Infrastructure
____ is a tool that is used to perform DNS zone transfers.
a. Whois c. Metis
b. Netcat d. Dig
d. DIG
The HTTP ____ method retrieves data by URI.
a. GET c. POST
b. PUT d. HEAD
a. GET
____ can be used to read PINs entered at ATMs or to detect long-distance authorization
codes that callers dial.
a. Shoulder surfing c. Zone transferring
b. Footprinting d. Social engineering
a. Shoulder Surfing
____ is a reasonably priced commercial port scanner with a GUI interface.
a. AW Security Port Scanner c. Ethereal
b. Common Vulnerabilities and Exposures d. Tcpdump
a. AW Security Port Scanner
The ____ relies on the OS of the attacked computer, so it?s a little more risky to use than
the SYN scan.
a. NULL scan c. XMAS scan
b. connect scan d. ACK scan
b. connect scan
____ is currently the standard port-scanning tool for security professionals.
a. Unicornscan c. Nessus
b. Fping d. Nmap
d. Nmap