NVST quiz 6 (151- 180)

Is this your test? Login to manage it. If not, you can create a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
A password cracker is needed to quickly rediscover a password. It is believed the password is only seven characters long, but was computer generated. Which of the following techniques would be the best method to use?
2.
1 point
In order to determine which class any IP address is in, one should examine the first _____ bits of the IP address.
3.
1 point
_______ is the method used by Nmap to determine the operating system of the target comptuer.
4.
1 point
Which of the following software is a good port scanning tool?
5.
1 point
Each of the following is an attribute that should be compiled for hardware when performing an asset identification except __________.
6.
1 point
Which of the following is Not a functional feature of Kernel-Mode Rootkits?
7.
1 point
Which Netcat command is used as a backdoor on window systems?
8.
1 point
You are connected to a server on the Internet and you click on a link on the server and receive a time-out message. What layer could be the cause of this message?
9.
1 point
Each of the following is a characteristic of information except __________.
10.
1 point
Which of the following is not a feature or capability of a port scanner?
11.
1 point
Which software is used to extract password representations?
12.
1 point
During an audit of a server system log, which of the following entries would be considered a possible security threat?
13.
1 point
A person wishing to prevent users from accessing a web server and the information on it would try a ____ attack.
14.
1 point
For Dos (Denial-of-Service) Attack, Stopping service can be achieved by:
i. Process killing
ii. Process crashing
iii. System reconfiguring
iv. Malformed packet attacks
15.
1 point
_______ is the interception of network data not intended for the machine that is intercepting the traffic.
16.
1 point
HTTP, FTP and Telnet work at which layer of the OSI model?
17.
1 point
Which of the following is not a well known TCP port number?
18.
1 point
Which type of Buffer Overflow Exploits will cause the operating system to shutdown or crash?
19.
1 point
Metasploit offers a huge set of _____, that is, the code the attacker wants to run on the target machine, triggered by the exploit itself.
20.
1 point
Which of the following is a weak password policy?
21.
1 point
Which software tool can be used for sniffing password?
22.
1 point
The use of Domain Name System (DNS) is to _________.
23.
1 point
Internet is “managed” by
24.
1 point
Attackers known as ____________ like to think of themselves as an elite group who are performing a valuable service in identifying security weaknesses.
25.
1 point
Which application-level Trojan backdoor is able to modify or replace critical operating system executable programs or libraries?
26.
1 point
The following are useful data elements from the Registrar of Whois Search except _______.
27.
1 point
In TCP header, there are TCP control bits, also know as the TCP flags.
28.
1 point
Which of the following is NOT a countermeasures for password attack?
29.
1 point
What is the purpose of a site survey?
30.
1 point
An attacker with low skill level is called?