1. _____ is a protocol for securely accessing a remote computer.
Answer
Correct Answer:
Secure Shell (SSH)
Note: This Question is unanswered, help us to find answer for this one
2. With ____, you can have your desktop computer or laptop start in both windows and linux.
Answer
Correct Answer:
Grand Unified Bootloader
Note: This Question is unanswered, help us to find answer for this one
3. Hackers use __________ to execute arbitrary scripts through the web browser.
Answer
Correct Answer:
Cross-site scripting (XSS)
Note: This Question is unanswered, help us to find answer for this one
4. Hackers can gain access to computer systems through the use of ____.
Answer
Correct Answer:
Ports
Note: This Question is unanswered, help us to find answer for this one
5. Which of the following programming languages are commonly associated with Buffer overflows?
Answer
Correct Answer:
C++
Note: This Question is unanswered, help us to find answer for this one
6. In relation to Wireshark filters, which of the following operators is/are equivalent to the equal function?
Answer
Correct Answer:
= === == eq
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
7. Which of the following are the advantages of using the symmetric cryptography algorithms?
Answer
Correct Answer:
They preserve confidentiality. They increase speed. They provide authenticity.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
8. ln ethical hacking, which Of the following information is gathered during the enumeration phase?
Answer
Correct Answer:
Usernames Server data
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
9. Identify the features of session hijacking.
Answer
Correct Answer:
Cleartext transmission. No account lockout for invalid session IDs
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
10. Which of the following operating systems are affected by the Stacheldraht tool for denial-of—service attacks?
Answer
Correct Answer:
Unix Solaris Linux
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
11. Which two of the following are the features of symmetric encryption algorithm, Blowfish?
Answer
Correct Answer:
It can be used on both 32-bit and 64-bit processors. It is simple and strong.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
12. Which of the following are the correct syntaxes for using ping command on Windows?
Answer
Correct Answer:
ping ping
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
13. Which of the following is an asymmetric encryption algorithm, which is of a variable length, is a one-way hash function and is a modification of MD5?
Answer
Correct Answer:
HAVAL
Note: This Question is unanswered, help us to find answer for this one
14. While using the BackTrack tool with Linux, which of the following commands can be used for renaming a text file from oIdExample.txt to newExample.txt?
Answer
Correct Answer:
mv oldExample.txt newExample.txt
Note: This Question is unanswered, help us to find answer for this one
15.
Which of the following protocols send clear information and can be easy targets for sniffing?
i) HTTP
ii) NNTP
iii) FTP
iv) IMAP
Answer
Correct Answer:
All Options i). ii), iii) and iv).
Note: This Question is unanswered, help us to find answer for this one
16. Which of the following is the correct syntax of the command that can be used to test whether or not a target FTP server is vulnerable to the FTP bounce attack?
Answer
Correct Answer:
nmap —b
Note: This Question is unanswered, help us to find answer for this one
17. Which of the following is the correct syntax of the command that can be used for performing a sneaky scan and for analyzing its behavior in Wireshark?
Answer
Correct Answer:
nmap —T1
Note: This Question is unanswered, help us to find answer for this one
18. Which of the following network scanning processes involves the use of an Internet Control Message Protocol (ICMP) message?
Answer
Correct Answer:
Pinging
Note: This Question is unanswered, help us to find answer for this one
19. Which of the following is the syntax of Hydra for brute-forcing a service with the username set to "administrator"?
Note: This Question is unanswered, help us to find answer for this one
20. While using Medusa for brute force attack, which of the following parameters is used for "Service to attack"?
Answer
Correct Answer:
-M
Note: This Question is unanswered, help us to find answer for this one
21. Which of the following echo requests is used by a Fraggle attack?
Answer
Correct Answer:
UDP
Note: This Question is unanswered, help us to find answer for this one
22. During which of the following types of scanning, carefully crafted messages or packets are sent to a target computer by using wellsknown port numbers that are less than or equal to 1024?
Answer
Correct Answer:
Port scanning
Note: This Question is unanswered, help us to find answer for this one
23. While creating a PDF document with launch action, which of the following parameters is used for defining the type of application that should run?
Answer
Correct Answer:
IF
Note: This Question is unanswered, help us to find answer for this one
24. In which ofthe following application-level attacks, SQL queries are crafted by an attacker for corrupting a database?
Answer
Correct Answer:
Jam
Note: This Question is unanswered, help us to find answer for this one
25. Which of the following is the correct syntax of the command for creating an ACK packet using HPING3 and sending it to port 80 on a victim?
Answer
Correct Answer:
Hping3 —A -p 80
Note: This Question is unanswered, help us to find answer for this one
26. During which of the following DOS attacks, custom-crafted fragmented packets, having offset values that overlap during the attempted rebuild. are sent by an attacker?
Answer
Correct Answer:
Teardrop
Note: This Question is unanswered, help us to find answer for this one
27. While scanning source ports using the nmap command, which of the following parameters is used for helping a user in specifying a source port?
Answer
Correct Answer:
-g
Note: This Question is unanswered, help us to find answer for this one
28. In which ofthe following types of attacks, cipher text is compared against the pro-computed hashes for finding the match?
Answer
Correct Answer:
Rainbow table attack
Note: This Question is unanswered, help us to find answer for this one
29.
The amitis tool, which is used for creating Trojans, opens which of the following ports for giving a hacker complete control over a victim's computer?
Answer
Correct Answer:
27551
Note: This Question is unanswered, help us to find answer for this one
30. While performing a check for open ports via three-way handshake in port scanning, which of the following TCP flags is used for instructing the sending system to immediately send all buffered data?
Answer
Correct Answer:
PSH
Note: This Question is unanswered, help us to find answer for this one
31. Which of the following Linux directories is used for containing references (represented as files with special properties) to all the CPU peripheral hardware?
Answer
Correct Answer:
/dev
Note: This Question is unanswered, help us to find answer for this one
32. Which of the following is the correct syntax of the HpingZ command that can be used for scanning a vulnerable host for the zombie scan?
Answer
Correct Answer:
hpin92 —S -r
Note: This Question is unanswered, help us to find answer for this one
33. While creating a backdoor with the SET tool, which Of the following commands can be used for interacting with the shell after the session has been opened?
Answer
Correct Answer:
sessions —i 1
Note: This Question is unanswered, help us to find answer for this one
34.
Which malware performs the following activities?
Displays pop-ups and nag screens.
Changes the start page of a browser.
Answer
Correct Answer:
Adware
Note: This Question is unanswered, help us to find answer for this one
35. Which type of malware has the following characteristics?
Answer
Correct Answer:
Rootkits
Note: This Question is unanswered, help us to find answer for this one
36. Which of the following options is a program that is used for automating an action in such a way that the action can be repeatedly performed at a much higher rate and for a longer period than a human Operator could perform?
Answer
Correct Answer:
Bot
Note: This Question is unanswered, help us to find answer for this one
37.
Choose True or False.
Sniffing can be done in both ways, i.e. from command line utility and graphic user interface (GUI).
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
38.
Which of the following are sniffing tools?
i) Wireshark
ii) Cain and Abel
iii) Dsniff
iv) Ettercap
v) Tcpdump
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
39. While using the Trojan detection tool, netstat, which of the following commands is used for detecting open ports?
Answer
Correct Answer:
netstat —an
Note: This Question is unanswered, help us to find answer for this one
40. Which of the following Linux directories contains programs for use by the system and system administrator?
Answer
Correct Answer:
/sbin
Note: This Question is unanswered, help us to find answer for this one
41. In order to prevent Trojan attacks, which ofthe following tools should be used for real-time tracking of port usage?
Answer
Correct Answer:
TCPView
Note: This Question is unanswered, help us to find answer for this one
42. Which of the following Linux commands is used for showing local or remote established connections?
Answer
Correct Answer:
netstat
Note: This Question is unanswered, help us to find answer for this one
43. For specifying a maximum transmission unit {MTU), which of the following is the correct nmap command that will generate a 32 byte packet?
Answer
Correct Answer:
nmap —mtu 32
Note: This Question is unanswered, help us to find answer for this one
44. Which of the following operating systems are vulnerable to distributed denial-of—service (DDOS) attacks?
Answer
Correct Answer:
All of the above.
Note: This Question is unanswered, help us to find answer for this one
45. Which of the following options indicates a special Linux permission, which makes a file unchangeable?
Answer
Correct Answer:
i
Note: This Question is unanswered, help us to find answer for this one
46.
During fingerprinting, which Of the following elements are analyzed for determining the operating system?
i)Don‘t fragment bit
ii)Window size
iii)Time-to-live on the outbound packet
iv)Type of service
Answer
Correct Answer:
All Options i), ii), iii) and iv).
Note: This Question is unanswered, help us to find answer for this one
47. While testing for weak authentication during fingerprinting MYSOL, which of the following commands is used for logging in to the MYSQL server and manipulating things after the credentials have been cracked?
Answer
Correct Answer:
root@root: mysql —h —u root —p
Note: This Question is unanswered, help us to find answer for this one
48. Which of the following ports is used for HTTPS traffic, which is secured by SSL?
Answer
Correct Answer:
443
Note: This Question is unanswered, help us to find answer for this one
49. Which of the following lPSec mechanisms is used for providing methods for the purpose of authenticating information as well as for encrypting the data?
Answer
Correct Answer:
Encapsulating Security Payload
Note: This Question is unanswered, help us to find answer for this one
50. Proxies operate at which of the following layers of the Open System Interconnection model?
Answer
Correct Answer:
Application layer
Note: This Question is unanswered, help us to find answer for this one
51. While using the BackTrack tool with Linux. which of the following commands is used for changing the password of the Linux box?
Answer
Correct Answer:
passwd
Note: This Question is unanswered, help us to find answer for this one
52. In relation to ethical hacking, which of the following statements is correct about botnet?
Answer
Correct Answer:
It is a group of computers that is controlled without the knowledge of their owners.
Note: This Question is unanswered, help us to find answer for this one
53. Which of the following protocols is used by the BOCK tool that is used for exploiting covert channels?
Answer
Correct Answer:
IGMP
Note: This Question is unanswered, help us to find answer for this one
54. What is the hexadecimal value of the NOP instruction that is applied to an Intel processor?
Answer
Correct Answer:
0x90
Note: This Question is unanswered, help us to find answer for this one
55. Which of the following wardriving tools is a network detector, sniffer, and intrusion detection system used on Linux?
Answer
Correct Answer:
Kismet
Note: This Question is unanswered, help us to find answer for this one
56. Which of the following options represents the process of exploiting holes in a poorly-configured software?
Answer
Correct Answer:
Shrink Wrap Code
Note: This Question is unanswered, help us to find answer for this one
57. Which of the following Linux commands is used for displaying the information of logged on users and their activities?
Answer
Correct Answer:
w
Note: This Question is unanswered, help us to find answer for this one
58. During which ofthe following attacks, an attacker has the plaintext and ciphertext of one or more messages and this information is used for determining the key in use?
Answer
Correct Answer:
Known Plaintext Attack
Note: This Question is unanswered, help us to find answer for this one
59.
Which of the following options are the effects Of a DOS attack?
i)Resource unavailability.
ii)lncreased spam e-mail.
iii)lncreased ads and pop-ups.
Answer
Correct Answer:
Only options i) and ii).
Note: This Question is unanswered, help us to find answer for this one
60.
Identify the type of denial-of—service (DOS) attack from the following statement
This attack queues up the packets that have bad source IP; uses memory and resources; and eventually hangs, reboots or crashes the system
Answer
Correct Answer:
SYN attack
Note: This Question is unanswered, help us to find answer for this one
61.
Which of the following options is a Linux/Unix sniffing tool that is designed for graphically displaying a system's incoming and outgoing connections?
Answer
Correct Answer:
EtherApe
Note: This Question is unanswered, help us to find answer for this one
62.
Using Nmap, which Of the following is the correct syntax for performing a ping to a remote Windows or Linux Operating system?
Answer
Correct Answer:
NMAP —sP —v
Note: This Question is unanswered, help us to find answer for this one
63. In relation to fingerprinting, which of the following is the correct syntax of the command, which is used for identifying the operating system that is serving a website and all the opened ports associated with the domain name? (Assume the domain name as abcExample.com.)
Answer
Correct Answer:
$nmap -0 -v abcExample.com
Note: This Question is unanswered, help us to find answer for this one
64. While using the Netcat tool, which of the following commands is used for setting up a listener?
Answer
Correct Answer:
nc -n -v -| -p 80
Note: This Question is unanswered, help us to find answer for this one
65. While using the BackTrack tool with Linux, which of the following commands can be used for displaying the contents of the password.txt file?
Answer
Correct Answer:
cat password.txt
Note: This Question is unanswered, help us to find answer for this one
66. Which of the following is/are the possible way(s) to manipulate programs through which a technical user may exploit stack-based overflows?
Answer
Correct Answer:
All of the above.
Note: This Question is unanswered, help us to find answer for this one
67. During which of the following attacks, a custom wordlist containing a list of all possible username and password combinations is used?
Answer
Correct Answer:
Dictionary Attacks
Note: This Question is unanswered, help us to find answer for this one
68. Which of the following frameworks is simpler and more efficient for creating and manipulating PDF frameworks?
Answer
Correct Answer:
Origami framework
Note: This Question is unanswered, help us to find answer for this one
69. In relation to the nmap command in OS fingerprinting, which of the following options can be used for performing both OS and service version detection?
Answer
Correct Answer:
-A
Note: This Question is unanswered, help us to find answer for this one
70.
While using the Netcap tool, which of the following commands is used for performing port scanning?
Answer
Correct Answer:
nc -v —2 -W1 lPaddress -
Note: This Question is unanswered, help us to find answer for this one
71.
Which of the following commands is used for performing a Xmas tree scan with Nmap?
Answer
Correct Answer:
NMAP —sX —v
Note: This Question is unanswered, help us to find answer for this one
72. In relation to fingerprinting, which of the following is the correct syntax ofthe nmap command, which is used for checking whether or not port 443 is Open? (Assume the domain name as abcExample.com.)
Answer
Correct Answer:
$nmap -sT -p 443 abcExample.com
Note: This Question is unanswered, help us to find answer for this one
73. Which of the following keyboard shortcuts stops working during a Trojan infection?
Answer
Correct Answer:
Ctrl + Alt + Del
Note: This Question is unanswered, help us to find answer for this one
74. Which of the following commands can be used for creating a firewall rule in iptable, which will result the blocking of ICMP ECHO requests from the outside sources and will disable ping sweeps on a network?
Answer
Correct Answer:
$iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP
Note: This Question is unanswered, help us to find answer for this one
75. In relation to switched network sniffing, which of the following options is represented by a switchport?
Answer
Correct Answer:
In relation to switched network sniffing, which of the following options is represented by a switchport?
Note: This Question is unanswered, help us to find answer for this one
76. In relation to ethical hacking. which of the following options refers to a method. which is used for determining the type of operating system running on a remote computer?
Answer
Correct Answer:
Fingerprinting
Note: This Question is unanswered, help us to find answer for this one
77.
Which of the following is the syntax of ping sweep using Nmap for ICMP scanning?
Answer
Correct Answer:
nmap —sP —PE —PA
Note: This Question is unanswered, help us to find answer for this one
78.
Which of the following statements is/are correct about stealth scan or half-Open scan?
i) With stealth scan, the chances of triggering the detection mechanism are high.
ii) Stealth scan is less reliable as compared to full-Open scan.
Answer
Correct Answer:
Only statement ii) is correct.
Note: This Question is unanswered, help us to find answer for this one
79. Which of the given types of viruses has the following characteristics?
Answer
Correct Answer:
Shell virus
Note: This Question is unanswered, help us to find answer for this one