0% found this document useful (0 votes)
29 views4 pages

6 Unit MCQ - PDF2 - Types-Of-Ethical-Hacking

The document outlines various types of ethical hacking, including tools and techniques used for network security, such as port scanning, network analysis, and protection methods like firewalls. It also highlights common vulnerabilities and attacks, such as DoS attacks, email bombs, and SQL injection. Additionally, it provides information on wireless LAN security and the importance of monitoring network performance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views4 pages

6 Unit MCQ - PDF2 - Types-Of-Ethical-Hacking

The document outlines various types of ethical hacking, including tools and techniques used for network security, such as port scanning, network analysis, and protection methods like firewalls. It also highlights common vulnerabilities and attacks, such as DoS attacks, email bombs, and SQL injection. Additionally, it provides information on wireless LAN security and the importance of monitoring network performance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

6- Types of Ethical Hacking

1. IDS stands for ___________


Ans: instrusion detection system.
2. A _____________can take down your Internet Connection or even you entire network.
Ans: DoS attack
3. A hacker using a ________________ can steal confidential information in e-mails and files being
transferred.
Ans: network analyzer
4. Network Testing and port scanning tools are __________________
a. Sam Spade
b. SuperScan
c. NetScan
d. Nmap or NmapWin
e. Netcat
f. WildPacketsEtherPeek
5. __________is a software tool that basically scans the network to see who’s there.
Ans: port scanner
6. ________________help to identify unauthorized hosts or applications and network host
configuration errors that can cause serious vulnerabilities.
Ans: port scanner
7. _________________tests can be performed very quickly without having to touch individual
network hosts.
Ans: Post-scan
8. As an ethical hacker, you should scan all _______UDP and ___________TCP ports on each
network host that’s found by your scanner.
Ans: 65,535 UDP , 65,535 TCP
9. Commonly Hacked Ports:
Ports No. Service
7 Echo
19 Chargen
20 FTP (File Transfer Protocol)
21 FTP control
22 SSH
23 Telnet
25 SMTP(Simple Mail Transfer Protocol)
37 Daytime
53 DNS(Domain Name System)
69 TFTP(Trivial File Transfer Protocol)
79 Finger
80 HTTP(HypeText Transfer Protocol)
110 POP3(POST OFFICE PROTOCOL Version 3)
111 SUN RPC(Remote Precedure Calls)
135 RPC/DCE end point mapper for Microsoft
networks
137,138,139 NetBIOS ove TCP/IP
161 SNMP(Simple Network Management Protocol)
220 IMAP(Internet Message Access Protocol)
443 HTTPS(HTTP over SSL)
512,513,514 Berkeley r commands
1214 Kazaa and Morpeus
1433 Micrsoft SQL Server
1434 Micrsoft SQL Monitor
3389 Windows Terminal Server
5631,5632 pcAnywhere
6346,6347 Gnutella
12345,12346,12631.12632,20034,20035 NetBus
27444,27665,31335 Trinoo
31335 Back Orifice
34555 Trinoo

10. ___________________ is a great tool for general network information, such as the number of
unique IP addresses, NetBIOS names, and MAC addresses found.
Ans: NetScanTools
11. ___________ is executed through the searching of a single host for open ports.
Ans: Port Scanning
12. ____________ is executed through the searching of multiple hosts in order to target just one
specific open port.
Ans: Port Sweeping
13. Protection from port scanning is often achieved through the use of a ________________.
Ans: Firewall
14. A _______ monitors incoming and outgoing connections through one’s personal computer.
Ans: Firewall
15. __________deny outside access to an individual’s personal computer.
Ans: Firewall
16. ICMP stands for ___________________
Ans: Internet Control Message Protocol.
17. _________ software helps you to monitor the performance of any IP-based device ad helps
businesses remotely visualize their system performance and monitor network services
bandwidth utilization, switches, routers and traffic flow.
Ans: Network monitoring
18. ___________________ is the act of capturing the information provided by banners,configurable
text-based welcome screens from network hosts that generally display system information.
Ans:Banner Grabbing
19. __________________is often used for white hat hacking endeavors like vulnerability analysis
and penetration testing as well as gray hat activities and black hat hacking.
Ans:Banner Grabbing
20. ___________________ is a tool that allows you to look into a network and analyze data going
across the wire for network optimization, security, and/or troubleshooting purposes.
Ans:Network Analyzer
21. _________________________ are often generically referred to as sniffers.
Ans:Network Analyzer
22. An excessive amount of ARP requests can be a sign of an ___________on your network.
Ans: ARP poisoning/ARP spoofing
23. SNMP stands for ___________________________
Ans: Simple Network Management Protocol
24. Name of the Network analyzer_____________
Name of Network Analyzer Supporting Operating System
EtherPeek by WildPackets Windows
Ethereal Windows and UNIX
Ettercap Windows and UNIX
Dsniff UNIX

25. _____________________ is one in which a mobile user can connect to a local area network through
a wireless(radio) connection.
Ans:Wireless LAN(WLAN)
26. The _________ group of standards specify the technologies for wireless LANs.
Ans: IEEE 802.11
27. Common Wireless LANs threats are ___________________________________
Ans: Rogue Access Points/Ad-Hoc Networks , Denial of Service,
Configuration Problems, Passive Capturing
28. Wireless Network Attacks are _______________________________________________
Ans : Encrypted traffic, rogue Networks, Physical security problems,
vulnerable wireless workstations, default configuration setting.
29. ____________________________ has its own weakness that allows hackers to crack the encryption
keys and decrypt the captured traffic.
Ans: 802.11 encryption protocol(Wired Equivalent Privacy(WEP))
30. _______________________ watch out for unauthorized access points and wireless clients attached
to your network that are running in ad-hoc mode.
Ans:Rogue Networks
31. Using ______, you can test for Access Points that don’t belong on your network.
Ans:NetStumbler or client manager software
32. _____________________ stores encrypted WEP keys in the Windows Registry even for multiple
networks.
Ans: Orinoco Client Manager
33. ______________________is a program that acts as an interface between the software and the
computer hardware.
Ans: Operating System
34. ______________is an integrated set of specialized programs used to manage overall resources
and operations of the computer.
Ans: Operating System
35. ________________is specialized software that controls and monitors the execution of all other
programs that reside in the computer, including application programs and other system
software.
Ans: Operating System
36. Some of the common vulnerabilities found in all versions of windows are_______
Ans: DoS,Remote Code Execution, Memory Corruption, Overflow, Sql Injection, XSS,
Http Response Splitting, Directory Traversal , Bypass something gain
Information/Privileges, CSRF File Inclusion etc.
37. ________________________ are those e-mail and instant messaging(IM) applications that we
depend on are often hacked within a network.
Ans: Messaging System
38. ________________ can crash a server and provide unauthorized administrator access.
Ans: Email Bombs
39. An Email bomb is also known as ______________.
Ans: letter bomb
40. _______________________ is form of Internet abuse which is perpetrated through the sending of
massive volumes of email to a specific email address with the goal of overflowing the
mailbox and overwhelming the mail server hosting the address, making it into some form of
denial of service attack.
Ans: Email bombs
41. An attacker can create an _________________ by sending hundreds or thousands of email with
very large attachments.
Ans:attachment-overloading attack
42. The whole email server may be targeted for a complete interruption of service with these
failures like ________________________________.
Ans: storage overload and bandwidth blocking
_________is an interesting attack to find two or more users on the same or different e-mail
systems.
Ans: Autoresponders attack
43. __________________ is that annoying automatic email response you often get back from random
users when you are subscribing to a mailing list.
Ans: Autoresponders attack
44. An attacker can crash your email service or bring it to a crawl by filling the incoming
Internet connection with junk is known as ____________________.
Ans : Bandwidth blocking
45. When a basic telnet connection is made on port 25(SMTP) ___________________displayed on an
email server.
Ans: Banner
46. Web application security vulnerabilities are ____________________________
Ans: SQL injection, Cross site Scripting, Security misconfiguration,Directory
Traversals.
47. _________________ allows an attacker to alter backend SQL statements by manipulating the user
supplied data.
Ans:SQL injection
48. Cross Site Scripting is also shortly known as _____________.
Ans: XSS
49. ______________ target scripts embedded in a page that are executed on the client side.
Ans: XSS
50. Attacker can use ________ to execute malicious scripts on the users browsers.
Ans: XSS
51. ______________is an attack which allows the attacker to execute the scripts on the victim’s
browser.
Ans: XSS
52. _____________________ attack is browsing a site and looking for clues about the server’s
directory structure.
Ans: Directory Traversal
53. ___________________ is an HTTP attack which allows attackers to access restricted directories
and execute commands outside of the web server’s root directory.
Ans: Directory Traversal or Path Traversal
54. Web servers provide two main levels of security mechanisms_________________________
a. Access Control Lists(ACLs)
b. Root directory
55. SNMP stands for ________________________
a. Simple Network Messaging Protocol
b. Simple Network Mailing Protocol
c. Simple Network Management Protocol
d. Simple Network Master Protocol
56. Banner grabbing is often used for
a. White Hat Hacking
b. Black Hat Hacking
c. Gray Hat Hacking
d. Script kiddies
57. A attacker can create an ________________attack by sending hundreds or thousands of e-
mails with very large attachments.
a. Connection attack
b. Auto responder attack
c. Attachment overloading attack
d. All of the above
58. Which of the following tool is used for Network Testing and Port Scanning
a. NetCat
b. SuperScan
c. NetScan
d. All of above

You might also like