NVST quiz 3 (61- 90)

Is this your test? Login to manage it. If not, you can create an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
The objectives of port scanning are generally to identify one or more of the following:
i. Open ports
ii. Host operating system
iii. Software or service versions
iv. Vulnerable software versions
2.
1 point
Which of the following statement is FALSE?
3.
1 point
You need to allow only secure Internet traffic in and out of your company network. Which of the following ports would you open on the firewall?
4.
1 point
Each of the following is an OSI model protocol layer except ______________.
5.
1 point
Which of the following is FALSE?
6.
1 point
Which of the following is the best way to protect against security vulnerabilities within OS software?
7.
1 point
Which of the following event file is the most often targeted because it contains the majority of the events that attackers wants to remove?
8.
1 point
The primary goal of information security is to protect ______________.
9.
1 point
Which of the following is the outcome of an Access Attack?
10.
1 point
Which of the following is the best method for preventing social engineering attacks?
11.
1 point
Which of the following statement is FALSE?
12.
1 point
Which of the following statements is FALSE?
13.
1 point
A _____ is an error condition in a software program that allows malicious code to be injected and put into operation without user intervention.
14.
1 point
Which of the following is the correct sequence of phases of hackers attack?
15.
1 point
Which of the following is NOT a defence against Physical Break-in Attack?
16.
1 point
To protect the privacy of web surfing habits, which of the following should be deleted on a regular basis?
17.
1 point
Which of the following is a known Kernel-Mode Rootkits software tool?
18.
1 point
When a browser surfs the Internet, which of the following is the correct order flow of data through the communication layers?
19.
1 point
Without even touching a computer, an attacker might be able to gain very sensitive information about an organisation through
i. Social Engineering;
ii. Physical Break-in;
iii. War Dialling;
iv. Dumpster Diving.
20.
1 point
In order to exploit RPC's vulnerability, the attacker would require the ability to send a specially crafted request to which three ports of the remote machine
21.
1 point
When a browser trying to contact a Web server, the client OS dynamically assigns a source port value of ______.
22.
1 point
The TCP/IP adheres roughly to the following protocol layers except _________.
23.
1 point
The attacker had managed to access the target system. Identify the command execution statement of
>net use z: \\192.168.1.2\c$ */u:student
24.
1 point
An attacker gathers the following types of reconnaissance data from company's own web site except _________.
25.
1 point
Which appllication-level Trojan backdoor is able to grab keystrokes from the user and sending them back sensitive information to the attacker?
26.
1 point
Which of the following is commonly found to be a nonessential service on a web server?
27.
1 point
For DoS (Denial-of-Service) Attack, Stopping service means:
28.
1 point
Which is NOT a countermeasure of Buffer Overflow Attacks?
29.
1 point
Which of the following protocols transmit sensitive information in clear text?
30.
1 point
Which of the following statement is FALSE about Covert_TCP?