Unit 6 QB UT2
Unit 6 QB UT2
Protocol Ans: C
2. Which of the following tool is used for Network Testing and port Scanning
A. NetCat
B. SuperScan
C. NetScan
D. All of above
Ans: D
D. Script Kiddies
Ans: A
A. Connection Attack
D. All the
above Ans: B
5.Which of the following tool is used for Windows for network queries from DNS lookups
to trace routes?
A. Sam Spade
B. SuperScan
C. NetScan
D. Netcat
Ans: A
A. Netcat
B. SamSpade
C. SuperScan
D. All the
above Ans: C
7. Which of the following tool is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Ans: A
A. Information gathering
B. Cracking password
C. Escalating privileges
D. Covering tracks
Ans: B
B. TCP scan
D. ACK scan
Ans: A
A. Spyware
B. Shoulder surfing
C. Trojan
D. Social engineering
Ans: A
A. True
B. False
Ans: A
12. is a popular tool used for discovering network as well as security auditing.
A. Ettercap
B. Metasploit
C. Nmap
D. Burp Suit
Ans: C
use? Ans: D
off. Ans: C
15. What are the some of the most common vulnerabilities that exist in a network system?
system. Ans: B
organization. Ans: D
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking
Ans: A
18. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
Ans: B
D. To locate
firewalls Ans: A
Ans: C
A. 22
B. 80
C. 20
D. 23
Ans: D
22. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN
Ans: D
23.Performing hacking activities with the intent on gaining visibility for an unfair situation
is called .
A. Cracking
B. Analysis
C. Hacktivism
D. Exploitation
Ans: C
network Ans: A
A. Reconnaissance
B. Maintaining Access
C. Scanning
D. Gaining Access
Ans: D
A. Passive stack
B. Active stack
D. Scanned
Ans: A
Ans: D
network Ans: B
A. Reconnaissance
B. Maintaining Access
C. Gaining Access
D. Scanning
Ans: C
30. framework made cracking of vulnerabilities easy like point and click.
A. Net
B. Metasploit
C. Zeus
D. Ettercap
Ans: B
B. Snort
C. Angry IP Scanner
D. Ettercap
Ans: C
32. is a popular tool used for network analysis in multiprotocol diverse network
A. Snort
B. SuperScan
C. Burp Suit
D. EtterPeak
Ans: D
A. SuperScan
B. Snort
C. Ettercap
D. QualysGuard
. Ans: A
A. DNSlookup
B. Whois
C. Nslookup
D. IP Network
Browser Ans: D
C. connection analysis
filtering Ans: A
A. Firewall bypassing
B. Wi-Fi attacks
C. Packet filtering
D. System password
cracking Ans: B
A. Spamming
B. Identify Theft
C. Impersonation
D. Scanning
Ans: C
network Ans: B
39 is used for searching of multiple hosts in order to target just one specific open port.
A. Ping Sweep
B. Port scan
C. Ipconfig
D. Spamming
Ans: A
A. Man-in-the-Middle attack
B. Denial-of-Service attack
C. Sniffing
D. Spoofing
Ans: A