6 Unit MCQ - PDF2 - Types-Of-Ethical-Hacking
6 Unit MCQ - PDF2 - Types-Of-Ethical-Hacking
10. ___________________ is a great tool for general network information, such as the number of
unique IP addresses, NetBIOS names, and MAC addresses found.
Ans: NetScanTools
11. ___________ is executed through the searching of a single host for open ports.
Ans: Port Scanning
12. ____________ is executed through the searching of multiple hosts in order to target just one
specific open port.
Ans: Port Sweeping
13. Protection from port scanning is often achieved through the use of a ________________.
Ans: Firewall
14. A _______ monitors incoming and outgoing connections through one’s personal computer.
Ans: Firewall
15. __________deny outside access to an individual’s personal computer.
Ans: Firewall
16. ICMP stands for ___________________
Ans: Internet Control Message Protocol.
17. _________ software helps you to monitor the performance of any IP-based device ad helps
businesses remotely visualize their system performance and monitor network services
bandwidth utilization, switches, routers and traffic flow.
Ans: Network monitoring
18. ___________________ is the act of capturing the information provided by banners,configurable
text-based welcome screens from network hosts that generally display system information.
Ans:Banner Grabbing
19. __________________is often used for white hat hacking endeavors like vulnerability analysis
and penetration testing as well as gray hat activities and black hat hacking.
Ans:Banner Grabbing
20. ___________________ is a tool that allows you to look into a network and analyze data going
across the wire for network optimization, security, and/or troubleshooting purposes.
Ans:Network Analyzer
21. _________________________ are often generically referred to as sniffers.
Ans:Network Analyzer
22. An excessive amount of ARP requests can be a sign of an ___________on your network.
Ans: ARP poisoning/ARP spoofing
23. SNMP stands for ___________________________
Ans: Simple Network Management Protocol
24. Name of the Network analyzer_____________
Name of Network Analyzer Supporting Operating System
EtherPeek by WildPackets Windows
Ethereal Windows and UNIX
Ettercap Windows and UNIX
Dsniff UNIX
25. _____________________ is one in which a mobile user can connect to a local area network through
a wireless(radio) connection.
Ans:Wireless LAN(WLAN)
26. The _________ group of standards specify the technologies for wireless LANs.
Ans: IEEE 802.11
27. Common Wireless LANs threats are ___________________________________
Ans: Rogue Access Points/Ad-Hoc Networks , Denial of Service,
Configuration Problems, Passive Capturing
28. Wireless Network Attacks are _______________________________________________
Ans : Encrypted traffic, rogue Networks, Physical security problems,
vulnerable wireless workstations, default configuration setting.
29. ____________________________ has its own weakness that allows hackers to crack the encryption
keys and decrypt the captured traffic.
Ans: 802.11 encryption protocol(Wired Equivalent Privacy(WEP))
30. _______________________ watch out for unauthorized access points and wireless clients attached
to your network that are running in ad-hoc mode.
Ans:Rogue Networks
31. Using ______, you can test for Access Points that don’t belong on your network.
Ans:NetStumbler or client manager software
32. _____________________ stores encrypted WEP keys in the Windows Registry even for multiple
networks.
Ans: Orinoco Client Manager
33. ______________________is a program that acts as an interface between the software and the
computer hardware.
Ans: Operating System
34. ______________is an integrated set of specialized programs used to manage overall resources
and operations of the computer.
Ans: Operating System
35. ________________is specialized software that controls and monitors the execution of all other
programs that reside in the computer, including application programs and other system
software.
Ans: Operating System
36. Some of the common vulnerabilities found in all versions of windows are_______
Ans: DoS,Remote Code Execution, Memory Corruption, Overflow, Sql Injection, XSS,
Http Response Splitting, Directory Traversal , Bypass something gain
Information/Privileges, CSRF File Inclusion etc.
37. ________________________ are those e-mail and instant messaging(IM) applications that we
depend on are often hacked within a network.
Ans: Messaging System
38. ________________ can crash a server and provide unauthorized administrator access.
Ans: Email Bombs
39. An Email bomb is also known as ______________.
Ans: letter bomb
40. _______________________ is form of Internet abuse which is perpetrated through the sending of
massive volumes of email to a specific email address with the goal of overflowing the
mailbox and overwhelming the mail server hosting the address, making it into some form of
denial of service attack.
Ans: Email bombs
41. An attacker can create an _________________ by sending hundreds or thousands of email with
very large attachments.
Ans:attachment-overloading attack
42. The whole email server may be targeted for a complete interruption of service with these
failures like ________________________________.
Ans: storage overload and bandwidth blocking
_________is an interesting attack to find two or more users on the same or different e-mail
systems.
Ans: Autoresponders attack
43. __________________ is that annoying automatic email response you often get back from random
users when you are subscribing to a mailing list.
Ans: Autoresponders attack
44. An attacker can crash your email service or bring it to a crawl by filling the incoming
Internet connection with junk is known as ____________________.
Ans : Bandwidth blocking
45. When a basic telnet connection is made on port 25(SMTP) ___________________displayed on an
email server.
Ans: Banner
46. Web application security vulnerabilities are ____________________________
Ans: SQL injection, Cross site Scripting, Security misconfiguration,Directory
Traversals.
47. _________________ allows an attacker to alter backend SQL statements by manipulating the user
supplied data.
Ans:SQL injection
48. Cross Site Scripting is also shortly known as _____________.
Ans: XSS
49. ______________ target scripts embedded in a page that are executed on the client side.
Ans: XSS
50. Attacker can use ________ to execute malicious scripts on the users browsers.
Ans: XSS
51. ______________is an attack which allows the attacker to execute the scripts on the victim’s
browser.
Ans: XSS
52. _____________________ attack is browsing a site and looking for clues about the server’s
directory structure.
Ans: Directory Traversal
53. ___________________ is an HTTP attack which allows attackers to access restricted directories
and execute commands outside of the web server’s root directory.
Ans: Directory Traversal or Path Traversal
54. Web servers provide two main levels of security mechanisms_________________________
a. Access Control Lists(ACLs)
b. Root directory
55. SNMP stands for ________________________
a. Simple Network Messaging Protocol
b. Simple Network Mailing Protocol
c. Simple Network Management Protocol
d. Simple Network Master Protocol
56. Banner grabbing is often used for
a. White Hat Hacking
b. Black Hat Hacking
c. Gray Hat Hacking
d. Script kiddies
57. A attacker can create an ________________attack by sending hundreds or thousands of e-
mails with very large attachments.
a. Connection attack
b. Auto responder attack
c. Attachment overloading attack
d. All of the above
58. Which of the following tool is used for Network Testing and Port Scanning
a. NetCat
b. SuperScan
c. NetScan
d. All of above