1. attack sends a combination of malformed IP packets to the victim system and causes the system to crash. The malformed packets consist of invalid/unexpected fragmentation. TCP segments, protocol, header values, packet size. offsets. routing flags. etc.
2. In relation to the Metasploit framework, which of the following commands is used for loading a particular auxiliary/exploit module?
3. During which type of scan, an attacker sends frames to a victim, without setting any flag?
4. In relation to Buffer overflows, which of the following canaries does not exist?
5. Which of the following options is the correct netcat command that can be used to open up ports for the SET webserver?
6. Which of the following Wireshark CLl tools is a small program that is only used for capturing traffic?
7. Trinoo/TrinOO is a set of programs to conduct a distributed denial-of-service (DDOS) attack. It is written in which language?
8. In the Linux operating system, which of the following commands can be used for retrieving DNS and host-related information?
9. Which of the following is a DOS-based wardialing program, which uses a modem for dialing ranges of numbers in search of a carrier frequency from a modem/ fax?
10. ARP poisoning can be prevented by enabling which of the following options on Cisco switches?
11. While using the BackTrack tool with Linux, which of the following commands can be used for creating a directory named Example?
12. While using the BackTrack tool with Linux, which of the following commands can be used for creating a text file named example?
13. While installing the Origami framework on BackTrack, which of the following is the correct tar command that can be used for extracting the contents?
14. Which of the following can help in the prevention of Buffer overflows?
15. What are the features of worms?
Ethical Hacking MCQs | Topic-wise