Professional Documents
Culture Documents
In order to compromise or to hack a system or network the hackers go through various phases of
the hacking. What is the first hacking phase that hackers perform to gather information about a
target prior to launching an attack?
Answer: Reconnaissance
Which of the following port NTP uses as its primary means of communication?
Answer: UDP port 123
Which of the following virus evade the anti-virus software by intercepting its requests to the
operating system?
In Wireshark, the packet bytes panes show the data of the current packet in which format?
Answer: Hexadecimal
Which of the following is considered as one of the most reliable forms of TCP scanning?
Which type of malware spreads from one system to another and replicate itself without any
human interaction
Answer: Worm
Which of the following is the BEST way to defend against network sniffing?
Which of these is capable of searching for and locating rogue access points?
Answer: WIPS
Which of the following techniques practiced by an attacker exploits human behavior to make your
network vulnerable to attacks?
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level
access?
Identify the web application attack where the attackers exploit vulnerabilities in dynamically
generated web pages to inject client-side script into web pages viewed by other users.
Which of the following firewall architecture is designed to host servers that offer public services?
You need a tool that can do network intrusion prevention and intrusion detection, function as a
network sniffer, and record network activity. What tool would you most likely select?
Answer: Snort
What type of message does the client send to the server in order to begin this negotiation?
Answer: SYN
In Wireshark, the packet bytes panes show the data of the current packet in which format?
Answer: Hexadecimal
What would you enter, if you wanted to perform a stealth scan using Nmap?
________ Testing is an adaptive SQL Injection testing technique used to discover coding errors by
inputting massive amounts of random data and observing the changes in the output
Answer: Fuzzing
Which protocol is used for setting up secure channels between two devices, typically in VPNs?
Answer: IPSEC