Sec All
Sec All
1. State the code that can be used by the hacker to perform this action.
The code a hacker can use to perform this ping of death attack is `ping -l 65858 192.168.0.100` on
2. State the error message that will be returned by the victim's machine.
The victim's machine will return the error message 'Packet needs to be fragmented but DF set' or
One responsibility of a professional hacker is to identify and fix security vulnerabilities in systems to
An ethical hacker is a cybersecurity expert who uses hacking techniques legally to help protect and
5. Cyberpunks?
Cyberpunks are individuals who use computers and digital networks to conduct illegal or
6. Phishing is a process?
Phishing is a process of tricking users into revealing sensitive information, such as passwords or
7. State one step that can be used to counter social engineering methods.
One step to counter social engineering methods is to provide regular security awareness training to
One method used in internet foot printing is performing DNS interrogation to gather information
Search engines can be used in web searching to locate and gather publicly available information
'WHOIS' is an Internet tool that provides registration and ownership details of a domain name.
Session hijacking can be accomplished by using packet sniffing or session prediction techniques.
Two ways to avoid logging by a proxy server are using a virtual private network (VPN) and
13. The command to perform a DNS zone transfer that allows anyone to query a DNS server
for information is
The command to perform a DNS zone transfer is `dig axfr @target-dns-server domain.com`.
14. The command (in Linux or Windows operating System) for a request for a Web page that
resides on a remote server and can track all of the intermediate servers on its way is
The command used to trace the route to a remote web server is `traceroute` in Linux or `tracert` in
Windows.
A white hacker is an ethical hacker who uses their skills to protect systems and networks from
malicious attacks.
Sniffers can be used for capturing and analyzing network traffic to detect vulnerabilities or monitor
data flow.
17. _____ allows you to capture packets from a live network and save them to a capture file
on disk
Tools like Wireshark or `tcpdump` allow you to capture packets from a live network and save them
to a capture file on disk.
Functions of a network monitor include monitoring traffic, detecting issues, and analyzing the
In an ARP attack, the attacker sends fake ARP messages to trick a device into associating the
attacker's MAC address with the IP address of another device on the network.
20. In a route table modification, If the route table cannot find a match it
If the route table cannot find a match for the destination IP address, it sends the packet to the
Options:
A) i, ii only
B) i, iii only
C) i, ii, iii, iv
D) ii, iii, iv only
Options:
A) i, ii only
B) i, ii, iii only
C) i, ii, iii, iv
D) ii, iv
3. An incorrectly configured DNS server may allow any Internet user to perform a zone transfer. The
command to perform a DNS zone transfer is:
A) S-dsniff
B) S-tcpdump
C) nslookup
D) S-t nslookup
Answer: C) nslookup
Explanation: nslookup can be used to perform DNS zone transfers if the server is misconfigured.
Options:
A) i, ii, iii
B) i, iv
C) i, ii
D) i, ii, iii, iv
Answer: C) i, ii
Explanation: Sniffers use programmatic interfaces (i) and bypass normal TCP/IP processing (ii). MAC
addresses and router attacks are unrelated to promiscuous mode.
Answer: D) Where you can read the traffic on the network segment upon which your computer resides
Explanation: Sniffers capture traffic on the local network segment.
6. In Connection Hijacking
Options:
A) i, ii only
B) ii, iii, iv only
C) iii, iv
D) i, ii, iii, iv
Answer: C) iii, iv
Explanation: Hijacking involves desynchronizing packets (iii) and forcing the victim to accept malicious
packets (iv).
Options:
A) i, ii only
B) i, ii, iii only
C) i, ii, iii, iv
D) ii, iii, iv only
Options:
A) i, ii, iii only
B) ii, iii, iv
C) ii, iii
D) iii, iv only
9. In an ARP test on a network, the Windows driver for the network card
Options:
A) i, ii, iii only
B) ii, iii, iv only
C) ii, iv only
D) i, iii only
Options:
A) i, ii
B) ii, iii, iv
C) ii, iii
D) i, ii, iii, iv
Answer: A) i, ii
Explanation: The decoy method uses fake accounts (ii) and monitors unauthorized access attempts (i).
A) -/der config-d
B) -/ifconfig -a
C) -/ps aux -a
D) -c /-ipconfig -d
Answer: B) -/ifconfig -a
Explanation: ifconfig -a (Unix/Linux) or ipconfig /all (Windows) can show promiscuous mode status.
Options:
A) i, ii
B) i, ii, iii
C) ii, iii, iv
D) i, ii, iii, iv
Answer: A) A security professional who applies hacking skills for defensive purposes
Explanation: Ethical hackers use skills to improve security.
Options:
A) i
B) i, ii
C) i, ii, iii
D) i, ii, iii, iv
Options:
A) i and ii only
B) ii, iii, and iv only
C) iii and iv
D) i, ii, iii, and iv
A) Hacker is not aware of all network conditions but uses various means to gain access
B) Victim is not aware that he or she is being hacked
C) Victim's firewall cannot detect the attacker
D) Attacker can attack the victim without being detected
Answer: A) Hacker is not aware of all network conditions but uses various means to gain access
Explanation: Blind spoofing occurs when the attacker lacks full network visibility.
Options:
A) i and ii
B) ii, iii, and iv
C) i, ii, iii, and iv
D) i, ii, iii
i) Antivirus software
ii) Booting from a live CD and then using antivirus
iii) Resetting jumpers on the motherboard
iv) Updating the firewall
Options:
A) i, ii
B) ii, iii
C) i, ii, iii
D) i, ii, iv
Answer: A) i, ii
Explanation: Antivirus (i) and live CD cleaning (ii) are effective.
Options:
A) i, ii
B) ii, iii
C) i, ii, iv
D) i, ii, iii, iv
Answer: C) i, ii, iv
Explanation: Encryption (i), secure networks (ii), and off-channel checks (iv) help prevent MITM.
A) Secure systems
B) Operating Systems
C) Honeypots
D) Proxies
Answer: C) Honeypots
Explanation: Honeypots lure attackers for analysis.
Options:
A) i, ii
B) ii, iii
C) i, iv
D) ii, iii, iv
Answer: C) i, iv
Explanation: Active spoofing involves network visibility (i) and packet manipulation (iv).
i) Detecting broadcasts, faking IP, and responding with the hacker's MAC
ii) Deleting the victim's address
iii) Replacing the victim's IP with their host address
iv) Copying the victim's password
Options:
A) i, ii
B) ii, iii, iv
C) i only
D) i, iv
Answer: C) i only
Explanation: ARP spoofing fakes IP-to-MAC mappings (i).
Options:
A) i, ii
B) ii, iii
C) i, ii, iii
D) i, ii, iv
i) SYN flood
ii) UDP flood
iii) Ping attack
iv) Time-to-Live attack
Options:
A) i, ii
B) ii, iii
C) i, ii, iii
D) i, ii, iii, iv
Answer: C) i, ii, iii
Explanation: Apsend can execute SYN, UDP, and ping attacks.
35. A form of malware that appears legitimate but performs malicious functions is:
A) Eavesdropping
B) Flooding
C) Spamming
D) Trojan horse
i) Remote access
ii) Data destruction and security disabler
iii) Downloader
iv) Denial-of-service
Options:
A) i, ii
B) ii, iii
C) i, ii, iii
D) i, ii, iii, iv
Options:
A) i, ii
B) ii, iii
C) i, ii, iii
D) i, ii, iii, iv
Answer: C) i, ii, iii
Explanation: Hackers exploit ports (i), OS info (ii), and TTL/firewall changes (iii).