Correct Answer:
Secure Shell (SSH)
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Grand Unified Bootloader
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Cross-site scripting (XSS)
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Ports
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
C++
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
=
===
==
eq
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
They preserve confidentiality.
They increase speed.
They provide authenticity.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Usernames
Server data
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Cleartext transmission.
No account lockout for invalid session IDs
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Unix
Solaris
Linux
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It can be used on both 32-bit and 64-bit processors.
It is simple and strong.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
ping
ping
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
HAVAL
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
mv oldExample.txt newExample.txt
Note: This Question is unanswered, help us to find answer for this one
Which of the following protocols send clear information and can be easy targets for sniffing?
i) HTTP
ii) NNTP
iii) FTP
iv) IMAP
Correct Answer:
All Options i). ii), iii) and iv).
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
nmap —b
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
nmap —T1
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Pinging
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Hydra —L administrator —P password.txt
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
-M
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
UDP
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Port scanning
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
IF
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Jam
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Hping3 —A
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Teardrop
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
-g
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Rainbow table attack
Note: This Question is unanswered, help us to find answer for this one
The amitis tool, which is used for creating Trojans, opens which of the following ports for giving a hacker complete control over a victim's computer?
Correct Answer:
27551
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
PSH
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
/dev
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
hpin92 —S -r
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
sessions —i 1
Note: This Question is unanswered, help us to find answer for this one
Which malware performs the following activities?
Displays pop-ups and nag screens.
Changes the start page of a browser.
Correct Answer:
Adware
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Rootkits
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Bot
Note: This Question is unanswered, help us to find answer for this one
Choose True or False.
Sniffing can be done in both ways, i.e. from command line utility and graphic user interface (GUI).
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
Which of the following are sniffing tools?
i) Wireshark
ii) Cain and Abel
iii) Dsniff
iv) Ettercap
v) Tcpdump
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
netstat —an
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
/sbin
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
TCPView
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
netstat
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
nmap —mtu 32
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the above.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
i
Note: This Question is unanswered, help us to find answer for this one
During fingerprinting, which Of the following elements are analyzed for determining the operating system?
i)Don‘t fragment bit
ii)Window size
iii)Time-to-live on the outbound packet
iv)Type of service
Correct Answer:
All Options i), ii), iii) and iv).
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
root@root: mysql —h
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
443
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Encapsulating Security Payload
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Application layer
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
passwd
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It is a group of computers that is controlled without the knowledge of their owners.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
IGMP
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
0x90
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Kismet
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Shrink Wrap Code
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
w
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Known Plaintext Attack
Note: This Question is unanswered, help us to find answer for this one
Which of the following options are the effects Of a DOS attack?
i)Resource unavailability.
ii)lncreased spam e-mail.
iii)lncreased ads and pop-ups.
Correct Answer:
Only options i) and ii).
Note: This Question is unanswered, help us to find answer for this one
Identify the type of denial-of—service (DOS) attack from the following statement
This attack queues up the packets that have bad source IP; uses memory and resources; and eventually hangs, reboots or crashes the system
Correct Answer:
SYN attack
Note: This Question is unanswered, help us to find answer for this one
Which of the following options is a Linux/Unix sniffing tool that is designed for graphically displaying a system's incoming and outgoing connections?
Correct Answer:
EtherApe
Note: This Question is unanswered, help us to find answer for this one
Using Nmap, which Of the following is the correct syntax for performing a ping to a remote Windows or Linux Operating system?
Correct Answer:
NMAP —sP —v
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
$nmap -0 -v abcExample.com
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
nc -n -v -| -p 80
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
cat password.txt
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
All of the above.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Dictionary Attacks
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Origami framework
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
-A
Note: This Question is unanswered, help us to find answer for this one
While using the Netcap tool, which of the following commands is used for performing port scanning?
Correct Answer:
nc -v —2 -W1 lPaddress
Note: This Question is unanswered, help us to find answer for this one
Which of the following commands is used for performing a Xmas tree scan with Nmap?
Correct Answer:
NMAP —sX —v
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
$nmap -sT -p 443 abcExample.com
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Ctrl + Alt + Del
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
$iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
In relation to switched network sniffing, which of the following options is represented by a switchport?
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Fingerprinting
Note: This Question is unanswered, help us to find answer for this one
Which of the following is the syntax of ping sweep using Nmap for ICMP scanning?
Correct Answer:
nmap —sP —PE —PA
Note: This Question is unanswered, help us to find answer for this one
Which of the following statements is/are correct about stealth scan or half-Open scan?
i) With stealth scan, the chances of triggering the detection mechanism are high.
ii) Stealth scan is less reliable as compared to full-Open scan.
Correct Answer:
Only statement ii) is correct.
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Shell virus
Note: This Question is unanswered, help us to find answer for this one
Ethical Hacking MCQs | Topic-wise