Ethical Hacking
Ethical Hacking
In which of the following penetration testing models, no information about the network is given
to tester?
a. White box model. b. Black box model. c. Red box Model. d. Gray box model. e. None of these.
Correct Answer: b
Detail Solution: In the white box model, the tester has complete information about the
network. In the black box model, the tester does not have any information about the network.
Gray box model is somewhere in between, where the tester is only provided with partial
information about the network. There is nothing called red box model.
Thus the correct option is (b).
____________________________________________________________________________
QUESTION 2:
Which of the following statement(s) is/are true for a circuit switched network?
a. A communication link can be shared by more than one connection.
b. A communication link is dedicated to a connection and cannot be shared with
other connections.
c. The packet transfer delay between a pair of nodes may depend on the prevailing
network traffic.
d. The packet transfer delay between a pair of nodes is more or less constant
during the entire period of the connection.
e. It is efficient for bursty traffic.
Correct Answer: b, d
Correct Answer: a, d
Detail Solution: Virtual circuit approach is a connection-oriented packet switching approach
where a route is established before packet transmission starts. For a session the packets
follows the same path, and then once the session is expired a new route is established. In
virtual circuit, a virtual id is used which is used by intermediate node of the route such that the
packet can be forwarded to the next node. This means that the Intermediate nodes can only
forward the packet and cannot make dynamic routing decision. In virtual circuit all packets
reach in order to the destination as packet follows the same path. It is not a true packet
switched network as it uses a fixed path for transmitting data.
Thus true options are (a) and (d).
______________________________________________________________________________
QUESTION 5:
Which of the following OSI layers is responsible for end-to-end reliable data transfer, with error
recovery and flow control?
a. Session layer
b. Transport layer
c. Network layer
d. Datalink layer
e. Physical layer
Correct Answer: b
Detail Solution: The physical layer is responsible for actual transmission of signals over a
communication medium. The data-link layer is responsible for transmitting data frames reliably
over point-to-point links. The network layer is responsible for the switching or routing of
packets from one node to the next on way to the final destination. The transport layer is a
virtual host-to-host layer between the two end systems which is responsible for end-to-end
reliable data transfer, with error recovery and flow control. The session layer manages
connection sessions.
Thus the correct option is (b).
______________________________________________________________________________
QUESTION 6:
Which of the following is/are false for TCP/IP model?
c. It can also represent any other protocol stack other than the TCP/IP suite such as
Bluetooth connection.
d. None of these.
Correct Answer: c
Detail Solution: TCP/IP is an open source scalable client-server based architecture used in
computer network. It is used to bridge the gap between non-compatible (heterogeneous)
networks. In TCP/IP based network a host/network can be added/removed without disturbing the
current services/systems of the network. TCP/IP is not generic, and thus can only represent the
protocol stacks defined in TCP/IP suite. It cannot represent any protocol that is not defined in
TCP/IP such as Bluetooth connection.
Thus the false option is (c).
______________________________________________________________________________
QUESTION 7:
Which of the following is true for the IP?
a. 32, 8
b. 32, 16
c. 48, 8
d. 48, 16
Correct Answer: b
Detail Solution: 32 bits are used for IP address whereas 16 bits are used for port number.