NVST TEST 2

Is this your test? Login to manage it. If not, you can build an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the following is a class C address?
2.
1 point
*Which of the following SuperScan4's tool is used to uncover the users account list?
3.
1 point
Password cracking involves _______________.
4.
1 point
IP addresses beginning with 127 decimal are reserved for ___________.
5.
1 point
*Which of the following is NOT a defence against Physical Break-in Attack?
6.
1 point
Which of the following protocol does Ethereal indicate when pinging a computer?
7.
1 point
*Which of the following protocols transmit sensitive information in clear text?
8.
1 point
A(n) _______ is a manner of manipulating software to result in undesired behaviour.
9.
1 point
*The exploitation of resources can be performed in many ways. Some of the more common ways are:
i. Technical Vulnerability Exploitation
ii. Denial of Service
iii. Information Gathering
iv. Social Engineering
10.
1 point
*Which of the following are the basic types of hackers attack?
i. Denial of Service Attack
ii. Repudiation Attack
iii. Access Attack
iv. Modification Attack
11.
1 point
Each of the following protocols can be used by TCP for transmissions over the Internet except _________.
12.
1 point
Which one of the following is not true about a web server?
13.
1 point
Which one of the following best describes the type of attack designed to bring a network to a halt by flooding the systems with useless traffic?
14.
1 point
Which of the following is Not the correct method to defense against bots, backdoors & spyware?
15.
1 point
*An attacker gathers the following types of reconnaissance data from company's own web site except _________.
16.
1 point
*The most important elements of Google’s technology are:
i. The Google bots
ii. The Google index
iii. The Google cache
iv. The Google API
17.
1 point
Starting with Windows XP Service pack 2 and Windows Server 2003 Service Pack 1, Microsoft's OS provides a feature called _____________ to support non-executable stack or heap capabilities.
18.
1 point
A _____ is an error condition in a software program that allows malicious code to be injected and put into operation without user intervention.
19.
1 point
*Which of the following is the best method for preventing social engineering attacks?
20.
1 point
Consider the situation in which an intervening entity such as a firewall blocks direct access to a target system. Resourceful attackers can find their way around these obstacles using __.