NVST quiz 2 (31- 60)

Is this your test? Login to manage it. If not, you can generate a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the following SuperScan4's tool is used to uncover the users account list?
2.
1 point
Which of the following are the basic types of hackers attack?
i. Denial of Service Attack
ii. Repudiation Attack
iii. Access Attack
iv. Modification Attack
3.
1 point
Which of the following is a class C address?
4.
1 point
Which of the following event file is used to stores events associated with the systems functioning e.g. failure of a driver or inability of a service to start in Windows system?
5.
1 point
The most important elements of Google’s technology are:
i. The Google bots
ii. The Google index
iii. The Google cache
iv. The Google API
6.
1 point
Most Application-layer protocols only use UDP or TCP at the Transport layer. Which of the following could use both?
7.
1 point
Which of the following is the type of algorithm used by MD5?
8.
1 point
The exploitation of resources can be performed in many ways. Some of the more common ways are:
i. Technical Vulnerability Exploitation
ii. Denial of Service
iii. Information Gathering
iv. Social Engineering
9.
1 point
Starting with Windows XP Service pack 2 and Windows Server 2003 Service Pack 1, Microsoft's OS provides a feature called _____________ to support non-executable stack or heap pabilities.
10.
1 point
Which of the following is Not a feature of Windows User-Mode Rootkits?
11.
1 point
Consider the situation in which an intervening entity such as a firewall blocks direct access to a target system. Resourceful attackers can find their way around these obstacles using.
12.
1 point
A(n) _______ is a manner of manipulating software to result in undesired behaviour.
13.
1 point
Which of the following event file is used to stores events associated with application e.g. database, Web servers or user applications in Windows system?
14.
1 point
Which of the following is Not the correct method to defense against bots, backdoors & spyware?
15.
1 point
Which of the following is NOT a Distributed Denial-of-Service defenses?
16.
1 point
Which of the following is FALSE?
17.
1 point
Which of the following is a correct definition of a Trojan?
18.
1 point
Each of the following protocols can be used by TCP for transmissions over the Internet except _________.
19.
1 point
The most popular techniques for launching packet floods are:
i. Bonk;
ii. SYN floods
iii. Smurf attacks
iv. Distributed DoS attacks
20.
1 point
IP addresses beginning with 127 decimal are reserved for ___________.
21.
1 point
Which of the following protocol does Ethereal indicate when pinging a computer?
22.
1 point
For Information Gathering Methodology under Publicly Available Information, what is the common information an attacker looks for?
i. Names
ii. Emails
iii. Technologies
iv. Current events / Recent happenings
23.
1 point
What does it mean when running the following command at PC 192.168.1.2? winrelay –lip 192.168.1.2 –lp 4000 –dip 192.168.1.23 –dp 5000 –proto tcp
i. It is a Trojan horse;
ii. PC 192.168.1.2 has been setup to listen to port 4000;
iii. The traffic arrives at port 5000 will be redirected to port 4000;
iv. PC 192.168.1.23 is the destination where the traffic will go to.
24.
1 point
Windows s events information is constantly being written into,
i. SECURITY.LOG ;
ii. FILE.LOG;
iii. APPLICATION.LOG;
iv. SYSTEM.LOG.
25.
1 point
Sending an e-mail from one address but making it seem as if it is coming from another is called ______________.
26.
1 point
Which one of the following best describes the type of attack designed to bring a network to a halt by flooding the systems with useless traffic?
27.
1 point
Which are the other three of the SIX common techniques can be applied to mount an effective defence against the attacks from having the ability to alter logs?
• Activate Logging
• Setting Proper Permissions
• Using a Separate Logging Server

i. Encrypting Log Files
ii. Making Log Files Append Only
iii. Protecting Log Files Using Write-once Media
iv. Renaming Log Files
28.
1 point
What is the meaning of Anonymizing HTTP Proxy?
29.
1 point
Which one of the following is not true about a web server?
30.
1 point
Password cracking involves _________________ .