NVST quiz 4 (91- 120)

Is this your test? Login to manage it. If not, you can develop a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the following represent the pool of well-known ports?
2.
1 point
Which of the following statement is FALSE about ICMP (Internet Control Message Protocol)?
3.
1 point
The File Transfer Protocol (FTP) can be accessed by each of the following except ________.
4.
1 point
TCP/IP family of protocols includes several components:
i. Transmission Control Protocol (TCP);
ii. User Datagram Protocol (UDP);
iii. Internet Protocol (IP);
iv. Internet Control Message Protocol (ICMP)
5.
1 point
Which layer of the OSI model is responsible for code and character-set conversion as well as recognizing data formats?
6.
1 point
Which of the following are TRUE about a Script Kiddie?
i. With low-level hacking skills
ii. Use released tools and software to exploit without understanding the underlying vulnerability
iii. Biggest group of attackers and usually rather immature
iv. Use Social Engineering technique
7.
1 point
Which of the following measures can be used to defend against Network Mapping?
i. Filter out the underlying message that network mapping tools rely on by using firewalls and the packet filtering router;
ii. Block incoming ICMP message;
iii. Filter ICMP_TIME_EXCEEDED messages leaving your network to stymie an attacker using traceroute;
iv. To prevent an attacker from discovering open ports on your
machine is to close all unused ports
8.
1 point
________ is the protocol Microsoft uses to share files, printers, and serial ports, and also to communicate between computers using named pipes.
9.
1 point
To prevent an attacker from discovering open ports on your machine is to _______.
10.
1 point
Passwords can be intercepted as they move through networks via which of the following?
11.
1 point
You are the security administrator for a bank. The users are complaining about the network being slow. However, it is not a particularly busy time of the day. You capture network packets and discover that hundreds of ICMP packets have been sent to the host. What type of attack is likely being executed against your network?
12.
1 point
Which of the following is the best option for a network administrator to prevent attacker to figure out users' IDs or password?
13.
1 point
Which of the following is NOT the correct countermeasure against SYN flooding?
14.
1 point
Which of the following is Not the functionality of BOTs software?
15.
1 point
Identify one method to defend against DDoS attack from locally stopping services?
16.
1 point
Which type of Buffer Overflow Exploits allows attacker to access the system as an impersonated root user?
17.
1 point
Nmap is able to provide the following types of scanning except ______.
18.
1 point
Running the following command at the PC with IP address 192.168.1.2. What does it mean? fpipe –l 1000 –r 5000 192.168.1.23
i. It is port redirection;
ii. Setup the PC (192.168.1.2) to listen to port 5000;
iii. PC 192.168.1.2 will pick up traffic entering at port 1000;
iv. The traffic arrives at port 1000 will be redirected to PC 192.168.1.23 at port 5000.
19.
1 point
The Transmission Control Protocol/Internet Protocol (TCP/IP) protocal that handles outgoing mail using port 25 is ______.
20.
1 point
Which of the following techniques are considered as Malformed Packet DoS Attacks?
i. Land
ii. Ping of Death
iii. Rose
iv. Bonk
21.
1 point
Illegal or unauthorized zone transfers are a significant and direct threat to what type of network server?
22.
1 point
Which of the following advantages are associated with using a firewall?
23.
1 point
What is the best measure to keep zombies off the system?
24.
1 point
Which of the following is a probable cause of a hacker creating a back door in a system?
25.
1 point
When a threat uses vulnerability to attack a resource, some severe consequences can result in
i. Loss of Confidentiality
ii. Loss of Integrity
iii. Loss of Availability
26.
1 point
You suspect one of your servers may have succumbed to a SYN flood attack. Which one of the following tools might you consider using to help confirm your suspicions?
27.
1 point
You can start to build defenses for your information system by creating security ____________.
28.
1 point
Under Phase of Attacks, DoS (Denial-of-Service) Attack is considered as which phase?
29.
1 point
Which of the followingis the process of identifying and reducing risk to a level that is comfortable and then implementing controls to maintain that level?
30.
1 point
Which of the following Hacker Class is also known as “Cracker”?