Question - 1
What is the attack called "evil twin"?
- Rogue access point
- Session hijacking
- MAC spoofing
- ARP poisoning
Solutions
Answer- A
Question - 2
What is the ethics behind training how to hack a system?
- To think like hackers and know how to defend such attacks
- To hack a system without the permission
- To hack a network that is vulnerable
- To corrupt software or service using malware
Solutions
Answer- A
Question - 3
___________ has now evolved to be one of the most popular automated tools for unethical hacking.
- Automated apps
- Malware
- Worms
- Database software
Solutions
Answer- B
Question - 4
_____________ is the technique used in business organizations and firms to protect IT assets.
- Ethical hacking
- Unethical hacking
- Fixing bugs
- Internal data-breach
Solutions
Answer- A
Question - 5
Before performing any penetration test, through legal procedure, which key points listed below are not mandatory?
- System and network
- Know the nature of the organization
- Type of broadband company used by the firm
- Characteristics of work done in the firm
Solutions
Answer- C
Question - 6
Scanning is performed in which phase of a pen test?
- Post-attack
- Attack
- Pre-attack
- Reconnaissance
Solutions
Answer- C
Question - 7
What is the preferred communications method used with systems on a bot-net?
Answer- A
Question - 8
Which of the following best describes a distributed denial-of-service attack?
- A DoS against an entire subnet, affecting multiple systems
- A DoS against multiple systems across an enterprise network
- A DoS against similar systems in different target networks
- A DoS carried out by multiple systems
Solutions
Answer- D
Question - 9
What are the forms of password cracking techniques?
- AttackSyllable
- AttackBrute Forcing
- AttacksHybrid
- All of the above
Solutions
Answer- D
Question - 10
Hacking for a cause is called_____________.
- Black-hat hacking
- .Active hacking
- Hacktivism
- Activism
Solutions
Answer- C
Question - 11
What does the TCP RST command do?
- Restores the connection to a previous state
- Resets the TCP connection
- Starts a TCP connection
- Finishes a TCP connections
Solutions
Answer- B
Question - 12
Why would an attacker want to perform a scan on port 137?
- To check for file and print sharing on windows systems
- To discover proxy servers on a network
- To discover a target system with the NetBIOS null session vulnerability
- To locate the FTP service on the target host
Solutions
Answer- C
Question - 13
Which tool can be used to perform a DNS zone transfer on windows?
- DNSlookup
- ipconfig
- whois
- nslookup
Solutions
Answer- D
Question - 14
________ helps to classify arguments and situations, better understand a cyber-crime, and helps to determine appropriate actions.
- Cyber-ethics
- Social ethics
- Cyber-bullying
- Corporate behaviour
Solutions
Answer- A
Question - 15
Which of the following is a passive wireless discovery tool?
- NetStumbler
- Kismet
- Netsniff
- Aircrack
Solutions
Answer- B
Question - 16
Which of the following is true regarding WEP cracking?
- Initialization vectors are small, get reused frequently, and are sent in cleartext.
- Initialization vectors are small, get reused frequently, but are encrypted during transmission.
- Initialization vectors are large, get reused frequently, and are sent in cleartext.
- Initialization vectors are large, get reused frequently, but are encrypted during transmission.
Solutions
Answer- A
Question - 17
Which wireless mode connects machines directly to one another, without the use of an access point?
- Ad hoc
- Point to point
- BSS
- ESS
Solutions
Answer- A
Question - 18
What does the program EliteWrap do?
- Provides secure, encrypted tunneling between hosts
- Binds Trojans to legitimate files for exploitation later
- Ports code easily between different operating systems
- Provides proxy services to obfuscate source IPs
Solutions
Answer- B
Question - 19
What is the best reason to implement a security policy?
- It makes security harder to enforce
- It removes the employee's responsibility to make judgements
- It increases security
- It decreases security
Solutions
Answer- B
Question - 20
What are the two basic types of attacks?
- Active
- Passive
- DoS
- Both 1 & 2
Solutions
Answer- D
Practice more set questions