NVST TEST 4

Is this your test? Login to manage it. If not, you can make a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
The Transmission Control Protocol/Internet Protocol (TCP/IP) protocal that handles outgoing mail using port 25 is ______.
2.
1 point
Which of the following represent the pool of well-known ports?
3.
1 point
*Which of the following is the process of identifying and reducing risk to a level that is comfortable and then implementing controls to maintain that level?
4.
1 point
Under Phase of Attacks, DoS (Denial-of-Service) Attack is considered as which phase?
5.
1 point
Which of the following advantages are associated with using a firewall?
6.
1 point
After running John the Ripper, the cracked password is stored in a local file called ________.
7.
1 point
Which of the following statements is FALSE about Risk Management?
8.
1 point
*TCP/IP family of protocols includes several components:
i. Transmission Control Protocol (TCP);
ii. User Datagram Protocol (UDP);
iii. Internet Protocol (IP);
iv. Internet Control Message Protocol (ICMP)
9.
1 point
*Which of the following measures can be used to defend against Network Mapping?
i. Filter out the underlying message that network mapping tools rely on by using firewalls and the packet filtering router;
ii. Block incoming ICMP message;
iii. Filter ICMP_TIME_EXCEEDED messages leaving your network to stymie an attacker using traceroute;
iv. To prevent an attacker from discovering open ports on your
machine is to close all unused ports
10.
1 point
Illegal or unauthorized zone transfers are a significant and direct threat to what type of network server?
11.
1 point
Which type of Buffer Overflow Exploits allows attacker to access the system as an impersonated root user?
12.
1 point
*Which of the following statement is FALSE about ICMP (Internet Control Message Protocol)?
13.
1 point
Which of the following is the best option for a network administrator to prevent attacker to figure out users' IDs or password?
14.
1 point
The File Transfer Protocol (FTP) can be accessed by each of the following except ________.
15.
1 point
*Internet search engines are used by attacker because they provide the following facilities except ________.
16.
1 point
*Which of the following are TRUE about a Script Kiddie?
i. With low-level hacking skills
ii. Use released tools and software to exploit without understanding the underlying vulnerability
iii. Biggest group of attackers and usually rather immature
iv. Use Social Engineering technique
17.
1 point
*To prevent an attacker from discovering open ports on your machine is to _______.
18.
1 point
General types of reconnaissance data can be obtained from Internet are:
i. Employee data
ii. Business partner
iii. Existing technologies
iv. Financial information
19.
1 point
Which software tool can be used for cracking window95, window98, SQL2000, Cisco PIX, and router's MD5 hashes?
20.
1 point
You are the security administrator for a bank. The users are complaining about the network being slow. However, it is not a particularly busy time of the day. You capture network packets and discover that hundreds of ICMP packets have been sent to the host. What type of attack is likely being executed against your network?