SIT384 - MCQ Flashcards

2
Q

____ takes penetration testing to a higher level.

a. Hacking c. Security testing
b. Cracking d. Packet sniffing

A

c. Security testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The International Council of Electronic Commerce Consultants (EC-Council) has
developed a certification designation called ____.
a. CompTIA Security+
b. OSSTMM Professional Security Tester (OPST)
c. Certified Information Systems Security Professional (CISSP)
d. Certified Ethical Hacker (CEH)

A

d. Certified Ethical Hacker (CEH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the TCP/IP stack, the ____ layer is concerned with controlling the flow of data,
sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP
header.
a. Internet c. Transport
b. Network d. Application

A

c. Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the TCP/IP stack, the ____ layer uses IP addresses to route packets.

a. Internet c. Transport
b. Network d. Application

A

a. Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A(n) ____ is the logical, not physical, component of a TCP connection.

a. ISN c. port
b. socket d. SYN

A

c. port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The SMTP service uses port ____.

a. 25 c. 69
b. 53 d. 80

A

a. 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ____ can replicate itself, usually through an executable program attached to an e-mail.

a. shell c. keylogger
b. virus d. rootkit

A

b. virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ____ is a computer program that replicates and propagates itself without having to
attach itself to a host.
a. virus c. worm
b. Trojan d. shell

A

c. worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PKI stands for ____.

a. Public Key Infrastructure c. Protected Key Infrastructure
b. Private Key Infrastructure d. Primary Key Infrastructure

A

a. Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ is a tool that is used to perform DNS zone transfers.

a. Whois c. Metis
b. Netcat d. Dig

A

d. DIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The HTTP ____ method retrieves data by URI.

a. GET c. POST
b. PUT d. HEAD

A

a. GET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ can be used to read PINs entered at ATMs or to detect long-distance authorization
codes that callers dial.
a. Shoulder surfing c. Zone transferring
b. Footprinting d. Social engineering

A

a. Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ is a reasonably priced commercial port scanner with a GUI interface.

a. AW Security Port Scanner c. Ethereal
b. Common Vulnerabilities and Exposures d. Tcpdump

A

a. AW Security Port Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ____ relies on the OS of the attacked computer, so it?s a little more risky to use than
the SYN scan.
a. NULL scan c. XMAS scan
b. connect scan d. ACK scan

A

b. connect scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ is currently the standard port-scanning tool for security professionals.

a. Unicornscan c. Nessus
b. Fping d. Nmap

A

d. Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unicornscan optimizes ____ scanning beyond the capabilities of any other port scanner.

a. TCP c. ICMP
b. UDP d. IP

A

b. UDP

18
Q

____, an open-source fork of Nessus, functions much like a database server, performing
complex queries while the client interfaces with the server to simplify reporting and
configuration.
a. Unicornscan c. OpenVAS
b. NetScanTools d. Nmap

A

c. OpenVAS

19
Q

The ____ tool enables you to craft an IP packet to your liking.

a. Unicornscan c. Nmap
b. Hping d. Ethereal

A

b. Hping

20
Q

The ____ command gives you a quick way to see whether there are any shared resources
on a computer or server.
a. Nbtstat c. NetDDE
b. Net view d. Netmon Agent

A

b. Net view

21
Q

The open-source descendant of Nessus is called ____.

a. NW c. OpenVAS
b. WNessus d. WinNessus

A

c. OpenVAS