NVST quiz 1 (1-30)

Is this your test? Login to manage it. If not, you can develop a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
For DoS (Denial-of-Service) Attack, Resource Exhaustion can be achieved by:
i. Spawning processes to fill the process table
ii. Filling up the whole file system
iii. Packet floods
iv. Malformed packet attacks
2.
1 point
Which application analyses surfer's shopping habits, interests and inserts Pop-up advertisement?
3.
1 point
Which of the following is not one of the IP address ranges reserved for private use by RFC 1918?
4.
1 point
Which method is NOT used as maintaining access attacks?
5.
1 point
The purpose of port scanning is systematically scan for range of ____.
6.
1 point
Which of the following event file is used to stores security-related events like failed logon attempts, policy changes, and attempts to access files without proper permission in Windows system?
7.
1 point
Which information directory protocol is the standard for file transfer over the Internet?
8.
1 point
The following are payloads provided by Metasploit to foist on the target machine except _____.
9.
1 point
What type of attack attempts to use every possible key until the correct key is found?
10.
1 point
Which of the followings are the common techniques used by sophisticated hacker for covering track and hiding in a compromised system?
i. Hiding evidence by altering event logs;
ii. Creating difficult to find files and directories;
iii. Hiding evidence on the network: Covert Channels;
iv. Deleting log files.
11.
1 point
The TCP/IP adheres roughly to the following protocol layers except _________.
12.
1 point
Which of the following is the correct sequence for OSI (Open Systems Interconnection) seven layers?
13.
1 point
The following are methods employed to uncover system vulnerabilities except ______.
14.
1 point
Which of the following information cannot generally be found from the target’s Internet Registrar?
15.
1 point
Which of the following troubleshooting utilities is common to all operating systems and is used for testing connectivity of two hosts on a network?
16.
1 point
Identify which category of Denial-of-Service attack if the attack is Smurf.
17.
1 point
What is hybrid password cracking?
18.
1 point
Ethereal is a software tool used to ______ between client and server machine.
19.
1 point
An attacker can gain access to very sensitive information about an organisation through the following except _________.
20.
1 point
Which of the following is the correct sequence of phases of hacker’s attack?
21.
1 point
A situation in which a program or process attempts to store more data in a temporary data storage area than it was intended to hold is known as a what?
22.
1 point
Which of the following protocols should be disabled on a critical network device such as a router?
23.
1 point
What is the information can be gathered by an attacker by typing the
following command using Netcat? C:> nc www.sp.edu.sg 80 HEAD / HTTP/1.0
24.
1 point
Which of the following statements are TRUE about Computer Misuse Act (Cap 50A)?
i. Any police officer may arrest without warrant any person reasonably suspected of committing an offence under this Act
ii. Any person who knowingly causes a computer to perform any function for the purpose of securing access without authority to any program or data held in any computer shall be guilty of an offence
iii. Any person who causes a computer to perform any function for the purpose of securing access to any program or data held in any computer with intent to commit an offence to which this section applies shall be guilty of an offence.
iv. Any person who does any act which he knows will cause an unauthorised modification of the contents of any computer shall be guilty of an offence
25.
1 point
Which of the followings are TRUE about Smurf Attack?
i. Smurf attack also known as directed broadcast attack
ii. Smurf attacks rely on a directed broadcast to create a flood of traffic for a victim
iii. A perpetrator sends a large amount of ICMP echo (ping) traffic at IP broadcast addresses, all of it having a spoofed source address of a victim
26.
1 point
Which of the following protocols is responsible for addressing hosts in a TCP/IP-based network?
27.
1 point
Which of the following is Not the correct defense method against User-Mode Rootkits?
28.
1 point
If the attack is SYN flood, which of the following category of Denial-of-Service attack it belong to?
29.
1 point
Which of the following NOT common activity for Scanning?
30.
1 point
A type of software that repairs security flaws in an application is called a(n) ________.