NVST TEST 3

Is this your test? Login to manage it. If not, you can make an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
*The objectives of port scanning are generally to identify one or more of the following:
i. Open ports
ii. Host operating system
iii. Software or service versions
iv. Vulnerable software versions (mst)
2.
1 point
*Which of the following is the outcome of an Access Attack?
3.
1 point
*Each of the following is an OSI model protocol layer except ______________.
4.
1 point
*Which of the following is the correct sequence of phases of hackers attack?
5.
1 point
*When a threat uses vulnerability to attack a resource, some severe consequences can result in
i. Loss of Confidentiality
ii. Loss of Integrity
iii. Loss of Availability
6.
1 point
*In order to exploit RPC's vulnerability, the attacker would require the ability to send a specially crafted request to which three ports of the remote machine.
7.
1 point
Which of the following is a probable cause of a hacker creating a back door in a system?
8.
1 point
Which is NOT a countermeasure of Buffer Overflow Attacks?
9.
1 point
*When a browser surfs the Internet, which of the following is the correct order flow of data through the communication layers?
10.
1 point
To protect the privacy of web surfing habits, which of the following should be deleted on a regular basis?
11.
1 point
You need to allow only secure Internet traffic in and out of your company network. Which of the following ports would you open on the firewall?
12.
1 point
For DoS (Denial-of-Service) Attack, Stopping service means:
13.
1 point
The primary goal of information security is to protect ______________.
14.
1 point
The attacker had managed to access the target system. Identify the command execution statement of >net use z: \\192.168.1.2\c$ */u:student
15.
1 point
Nmap is able to provide the following types of scanning except ______.
16.
1 point
*Which of the following statements is FALSE?
17.
1 point
The TCP/IP adheres roughly to the following protocol layers except _________.
18.
1 point
Which layer of the OSI model is responsible for code and character-set conversion as well as recognizing data formats?
19.
1 point
*Which of the following Hacker Class is also known as “Cracker”?
20.
1 point
*Without even touching a computer, an attacker might be able to gain very sensitive information about an organisation through
i. Social Engineering;
ii. Physical Break-in;
iii. War Dialling;
iv. Dumpster Diving.