Question 110-135

Is this your test? Login to manage it. If not, you can generate a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
_______ is the method used by Nmap to determine the operating system of the target computer.
2.
1 point
Metasploit offers a huge set of _____, that is, the code the attacker wants to run on the target machine, triggered by the exploit itself.
3.
1 point
In order to determine which class any IP address is in, one should examine the first _____ bits of the IP address.
4.
1 point
Which of the following is a weak password policy?
5.
1 point
Each of the following is a characteristic of information except __________.
6.
1 point
A password cracker is needed to quickly rediscover a password. It is believed the password is only seven characters long, but was computer generated. Which of the following techniques would be the best method to use?
7.
1 point
In Microsoft Windows, the name of the background program, such as Svchost.exe, is called a ________.
8.
1 point
Which type of Buffer Overflow Exploits will cause the operating system to shutdown or crash?
9.
1 point
Which one of the following is not a private IP address?
10.
1 point
For Dos (Denial-of-Service) Attack, Stopping service can be achieved by:
i. Process killing
ii. Process crashing
iii. System reconfiguring
iv. Malformed packet attacks
11.
1 point
The use of Domain Name System (DNS) is to _________.
12.
1 point
Which software tool can be used for sniffing password?
13.
1 point
Which of the following best describes a vulnerability?
14.
1 point
Which of the following software is a good port scanning tool?
15.
1 point
You are connected to a server on the Internet and you click on a link on the server and receive a time-out message. What layer could be the cause of this message?
16.
1 point
What port does the netbus server listen on?
17.
1 point
Which of the following is associated with behaviors such as collecting personal information or changing your computer configuration, without appropriately obtaining prior consent?
18.
1 point
Which software is used to extract password representations?
19.
1 point
HTTP, FTP and Telnet work at which layer of the OSI model?
20.
1 point
Which Netcat command is used as a backdoor on window systems?
21.
1 point
Which of the following is NOT a countermeasures for password attack?
22.
1 point
Which of the following is a hardware or software system used to protect a network from unauthorized access?
23.
1 point
You suspect that a system is infected with a Trojan Horse program and is sending data outbound from the system. Which of the following can be used to detect this activity?
24.
1 point
During an audit of a server system log, which of the following entries would be considered a possible security threat?
25.
1 point
Internet is 'managed' by