You are on page 1of 16

Cyber security is information technology security and can be divided

into a few common categories.


Network security
Operational security
Application security
All of these

A computer program used to retrieve information about users and


groups on networked computers.
Network Enumerator
Network Vulnerability Scanner
Web Application Security Scanner
Computer Worm

Which of the below-mentioned scanner is used for Network


vulnerability scanner.
OWASP ZAP
w3af
Nmap
OpenVAS
Goal of the openVAS is
Install OpenVAS server and client packages on Ubuntu.
Update OpenVAS vulnerability tests Both a and b.
Scans in batch mode from the command-line client.
All of these.

Network mapper is an open source tool which is unable exploring the


network.
True
False

Which of the below-mentioned is advantage used for cybersecurity.


Provide data and system privacy.
firewall are difficult to configure correctly.
Makes the system week.
Incorrect firewalls rules block the user.

Packet sniffers to capture information from network administrators to


fish out intruders or anomalous connections.
True
False
Snort can block traffic
True
False

Advantage of network sniffing is


Catching password.
Capturing special and private information of transaction.
Analyze network problem.
Modify and damage the system.

Virtual Private Network technologies are most prevalent today.


SSL, IPSec
IPSec, PPTP
L2TP, SSL
MLPS, IPSec
Firewalls that allow monitoring of traffic in and out of a network and
alerts network staff when suspicious traffic patterns occur.
Router
IDS
Hub
Switch
Principle of a firewall is
Enables fast forwarding
Route frames
Route hot packets
Inspect packets

Snort based IDS used for


A network IDS in a single machine .
Multiple Snort IDS in multiple machine.
Both a and b.
None of these .

A packet analyzer that includes GUI and command line.


TCPDump
WinDump
Both a and b
None of these
1. Penetration testing used for
Unable to deploy, configure and use.
scan a system not easily.
categorize vulnerabilities based on severity.
Unable to re-verify previous exploits.
Benefits of a network sniffer in cyber security
Identify and pinpoint unusual traffic in your network.
Collect data for security analysis.
Detect peaks and valleys in the bandwidth usage.
All of these.

Web vulnerabilities tool Nikto support for


Supports full HTTP Proxy.
Full support for SSL.
Both a and b.
None of these.

John the ripper is highly support to


Win32
DOS
Unix
OpenVMS

HTC Hydra is a network login cracking too.


True
False
Crack is a grouping of passwords until it finds one that it matches of
password cracking utility that runs through.
True
False

Cybersecurity used to protect the integrity of


Networks.
Programs and data from attack.
Damage or unauthorized access.
All of the above.

A program that communicates with a Web application to find potential


vulnerabilities within the application or its architecture.
Network Enumerator.
Network Vulnerability Scanner.
Web Application Security Scanner.
Computer Worm.

Which of the below tool Available for Vulnerability Scanning


Scan my server.
SSL Labs
SUCURI
All of these.
Socat is a mostly relay for bidirectional data transfer between two independent
data channels. Each of these data channels.
Device (terminal or modem)
Data pipe.
Socket
A file

Nmap has a variety of related facility including


Network mapping.
Security auditing.
Both a and b.
None of these.

Open source network scanners with automation performs test


NMAP
NESSUS
OpenVAS
Nikto

Windows 7 firewall include


Windows Firewall.
Windows Firewall with Advanced Security (WFAS).
Both a and b.
None of these.
----------- Devices that capture the essential information from the end network .
Routers
Trappers
Wireless-crackers
Sniffers

To avoid packet-sniffing exploits


Escape packet text.
Scan for viruses.
Encrypt network communication with SSL .
Packet plugs.

To filter all traffic going on an internal web server from the Internet side of the
firewall, port filter on the firewall.
8080
21
80
25
METASPLOIT ability consist of
Smart exploitation.
Password auditing.
Web application scanning.
None of these.
Snort-based IDS contains components
Packet Decoder.
Preprocessors.
Detection Engine.
All of these.

TCPdump is inspect traffic, a command line tool and parsing the data such as
Netcat
Packet sniffing
Metasploit
None of these

Metasploit support to active exploits as


Focus on clients such as web browsers, FTP clients.
Conjunction with email exploits, waiting for connections.
Exploits wait for incoming hosts and exploit them as they connect.
None of these

In Windows 7 firewall with different network profiles can be configured on


different interfaces with profiles available.
Public
Home/Work - private network.
Domain - used within a domain.
All of these
Penetration testing in metasploit for performing.
Smart payload generation and switching mechanism.
Support for testing large networks and easy naming conventions.
Cleaner exits.
All of these.

OpenSSL support to attributes


Cross-Platform, password auditing, web application scanning.
Open Source, Cross-Platform, Command-Line Interface.
smart exploitation, password auditing, Cross-Platform.
Open Source, password auditing, Command-Line Interface .

Nikto support to attribute


SSL support, Full HTTP proxy support, Easily updated via command line.
Cross platform , SSL support, WML Support, Easily updated via command line.
HTML support, SSL support, Cross platform.
Full HTTP proxy support, Cross platform, HTML support .

User friendly static Password Cracking Tool


Lophtcrack
John The Ripper
THC Hydra
Ophcrack
Zed Attack Proxy support for
Auto tagging.
Report generation.
Session comparison.
All of these.

Which of the below-mentioned scanner is used for Web application


security scanner.
Nmap
Superscan
Nikto
OpenVAS

OpenSSL’s libraries to secure data or establish secure connections.


True
False

Nmap will not check


Services different hosts are offering.
On what OS they are running.
What kind of firewall is in use.
None of these
Vulnerability scanner test the following
All hosts
All open ports
Both a and b
None of these.

Open source network scanners(nmap) with performs automation test.


TCP, SCTP (Stream Control Transmission Protocol).
TCP , UDP,SCTP,ICMP.
ICMP((Internet Control Message Protocol), UDP.
TCP, UDP,SCTP.

Vulnerabilty probe, security bugs can’t be identified without sending a


payload that exploit a suspected weakness.
True
False

One of this is category of a threat


Stalking
Phishing
Soliciting
None of these
OpenVAS scanner used to work with entered an IP address, a range of
IP addresses or hostname.

True
False

A variety of scans can be performed using Nmap

XMAS scan.
NULL SCAN.
Both a and b.
None of these.
Dynamic sniffing is difficult to distinguish.
True
False

Following is not a security exploit?


Eavesdropping.
Cross-site scripting.
Authentication.
SQL Injection.

Following attribute support for Windows Firewall


Support for logging.
Inbound filtering.
Support for complex rules.
All of these.

Which of the following is TRUE?


The firewall may be a separate computer system, a software service
running on an existing router or server, or a separate network
containing a number of supporting devices.
All of the given options are correct.
Firewalls can be categorized by processing mode, development era,
or structure.
Firewalls categorized by which level of technology they employ are
identified by generation, with the later generations being more
complex and more recently developed.
Penetration testing is the practice of attacking on client’s systems in the
same way a hacker would to identify security holes.
True
False

One of the following deal with network intrusion detection and traffic
analysis
Zed Attack
Snort
HTC-Hydra
Wireshark
Traffic probe which include one of the flollowing
Network intrusion detection.
High speed traffic processing.
Network traffic management.
None of these

w3af support to attribute


SSL support, Full HTTP proxy support, Scans multiple ports.
Cross platform , Interaction among plugins , WML Support.
HTML support, SSL support, Scans multiple ports.
WML Support, Cross platform , nmap.

One of the following Tool used for encrypted passwords based on


varies hashes are up to be broken.
THC Hydra.
Lophtcrack.
John The Ripper.
Ophcrack.
An easy to use web application pen testing.
Zed Attack Proxy.
John the Ripper.
THC-Hydra.
None of these.

One of the following feature support for Nikto tool.


a. Add custom headers to requests.
b. Stapling vulnerability.
c. Full HTTP proxy support.
d. Cookie handling.

You might also like