NVST TEST 1

Is this your test? Login to manage it. If not, you can build an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Ethereal is a software tool used to ______ between client and server machine
2.
1 point
*Which of the following information cannot generally be found from the target’s Internet Registrar?
3.
1 point
A type of software that repairs security flaws in an application is called a(n) ________.
4.
1 point
A situation in which a program or process attempts to store more data in a temporary data storage area than it was intended to hold is known as a what?
5.
1 point
*An attacker can gain access to very sensitive information about an organisation through the following except _________.
6.
1 point
*Which of the following NOT common activity for Scanning?
7.
1 point
*Sending an e-mail from one address but making it seem as if it is coming from another is called ______________.
8.
1 point
The following are methods employed to uncover system vulnerabilities except ______.
9.
1 point
*Which of the following is the correct sequence for OSI (Open Systems Interconnection) seven layers?
10.
1 point
*Which of the following statements are TRUE about Computer Misuse Act (Cap 50A)?
i. Any police officer may arrest without warrant any person reasonably suspected of committing an offence under this Act
ii. Any person who knowingly causes a computer to perform any function for the purpose of securing access without authority to any program or data held in any computer shall be guilty of an offence
iii. Any person who causes a computer to perform any function for the purpose of securing access to any program or data held in any computer with intent to commit an offence to which this section applies shall be guilty of an offence.
iv. Any person who does any act which he knows will cause an unauthorised modification of the contents of any computer shall be guilty of an offence
11.
1 point
The following are payloads provided by Metasploit to foist on the target machine except _____.
12.
1 point
*Which of the following protocols is responsible for addressing hosts in a TCP/IP-based network?
13.
1 point
Which of the following troubleshooting utilities is common to all operating systems and is used for testing connectivity of two hosts on a network?
14.
1 point
*Which of the following is the correct sequence of phases of hacker’s attack?
15.
1 point
What type of attack attempts to use every possible key until the correct key is found?
16.
1 point
The purpose of port scanning is systematically scan for range of ____.
17.
1 point
Which of the following is not one of the IP address ranges reserved for private use by RFC 1918?
18.
1 point
*What is the information can be gathered by an attacker by typing the
following command using Netcat? C:> nc www.sp.edu.sg 80 HEAD / HTTP/1.0
19.
1 point
Which of the following
protocols should be disabled on a critical network device such as a router?
20.
1 point
*Which information directory protocol is the standard for file transfer over the Internet?