0% found this document useful (0 votes)
22 views17 pages

Sec All

The document contains a series of cybersecurity questions and answers covering various topics such as hacking techniques, ethical hacking, network security, and common attacks like phishing and ARP spoofing. It includes specific commands for executing tasks related to network monitoring and security, as well as explanations of concepts like session hijacking and sniffers. Additionally, it discusses motivations for hacking and defenses against various cyber threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views17 pages

Sec All

The document contains a series of cybersecurity questions and answers covering various topics such as hacking techniques, ethical hacking, network security, and common attacks like phishing and ARP spoofing. It includes specific commands for executing tasks related to network monitoring and security, as well as explanations of concepts like session hijacking and sniffers. Additionally, it discusses motivations for hacking and defenses against various cyber threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

SECTION A - Cybersecurity Questions and Answers

1. State the code that can be used by the hacker to perform this action.

The code a hacker can use to perform this ping of death attack is `ping -l 65858 192.168.0.100` on

Windows or `ping -s 65858 192.168.0.100` on Linux.

2. State the error message that will be returned by the victim's machine.

The victim's machine will return the error message 'Packet needs to be fragmented but DF set' or

'Request Timed Out.'

3. State one responsibility of a professional hacker.

One responsibility of a professional hacker is to identify and fix security vulnerabilities in systems to

prevent unauthorized access.

4. An ethical hacker is?

An ethical hacker is a cybersecurity expert who uses hacking techniques legally to help protect and

secure computer systems.

5. Cyberpunks?

Cyberpunks are individuals who use computers and digital networks to conduct illegal or

unauthorized activities, often challenging authority or institutions.

6. Phishing is a process?

Phishing is a process of tricking users into revealing sensitive information, such as passwords or

credit card numbers, by pretending to be a trustworthy source.

7. State one step that can be used to counter social engineering methods.

One step to counter social engineering methods is to provide regular security awareness training to

users and employees.

8. One method used in Internet foot printing is

One method used in internet foot printing is performing DNS interrogation to gather information

about a target's domain.


9. Search Engines can be used in Web searching to

Search engines can be used in web searching to locate and gather publicly available information

about a target or organization.

10. 'WHOIS' is an Internet tool that

'WHOIS' is an Internet tool that provides registration and ownership details of a domain name.

11. Session hijacking can be accomplished by using

Session hijacking can be accomplished by using packet sniffing or session prediction techniques.

12. Two ways to avoid logging by a proxy server are

Two ways to avoid logging by a proxy server are using a virtual private network (VPN) and

encrypting your web traffic with HTTPS.

13. The command to perform a DNS zone transfer that allows anyone to query a DNS server

for information is

The command to perform a DNS zone transfer is `dig axfr @target-dns-server domain.com`.

14. The command (in Linux or Windows operating System) for a request for a Web page that

resides on a remote server and can track all of the intermediate servers on its way is

The command used to trace the route to a remote web server is `traceroute` in Linux or `tracert` in

Windows.

15. A white hacker?

A white hacker is an ethical hacker who uses their skills to protect systems and networks from

malicious attacks.

16. Sniffers can be used for?

Sniffers can be used for capturing and analyzing network traffic to detect vulnerabilities or monitor

data flow.

17. _____ allows you to capture packets from a live network and save them to a capture file

on disk

Tools like Wireshark or `tcpdump` allow you to capture packets from a live network and save them
to a capture file on disk.

18. Functions of a network monitor includes

Functions of a network monitor include monitoring traffic, detecting issues, and analyzing the

performance of network systems in real-time.

19. In an Address Resolution Protocol (ARP) Attack, the attacker

In an ARP attack, the attacker sends fake ARP messages to trick a device into associating the

attacker's MAC address with the IP address of another device on the network.

20. In a route table modification, If the route table cannot find a match it

If the route table cannot find a match for the destination IP address, it sends the packet to the

default gateway or drops it.


1. The Transmission Control Protocol (TCP)

i) Provides connection-oriented services between a source and destination computer


ii) Guarantees delivery of packets
iii) Packets reach the application layer in the right order
iv) Identifies and assembles packets based on sequence numbers

Options:
A) i, ii only
B) i, iii only
C) i, ii, iii, iv
D) ii, iii, iv only

Answer: C) i, ii, iii, iv


Explanation: TCP is a connection-oriented protocol that ensures reliable delivery (ii), correct ordering
(iii), and uses sequence numbers for reassembly (iv).

2. In a Connection Release process

i) Source computer sends a FIN packet to the destination computer


ii) Destination computer then sends a FIN/ACK packet
iii) Source computer sends an ACK packet
iv) Either computer could send an RST and close the session (reset) immediately

Options:
A) i, ii only
B) i, ii, iii only
C) i, ii, iii, iv
D) ii, iv

Answer: C) i, ii, iii, iv


Explanation: TCP connection termination follows a four-way handshake (i-iii), and an RST can forcibly
close the connection (iv).

3. An incorrectly configured DNS server may allow any Internet user to perform a zone transfer. The
command to perform a DNS zone transfer is:

A) S-dsniff
B) S-tcpdump
C) nslookup
D) S-t nslookup
Answer: C) nslookup
Explanation: nslookup can be used to perform DNS zone transfers if the server is misconfigured.

4. A sniffer puts a network card into promiscuous mode

i) By using a programmatic interface


ii) The interface can bypass the TCP/IP stack of the operating system
iii) By using a MAC address
iv) By attacking the routers in the transmission path

Options:
A) i, ii, iii
B) i, iv
C) i, ii
D) i, ii, iii, iv

Answer: C) i, ii
Explanation: Sniffers use programmatic interfaces (i) and bypass normal TCP/IP processing (ii). MAC
addresses and router attacks are unrelated to promiscuous mode.

5. A sniffer must work with the type of network interface

A) Supported by your operating system


B) Where the sniffers look only at the traffic passing through the network interface adapter
C) On the machine where the application is resident
D) Where you can read the traffic on the network segment upon which your computer resides

Answer: D) Where you can read the traffic on the network segment upon which your computer resides
Explanation: Sniffers capture traffic on the local network segment.

6. In Connection Hijacking

i) An attacker copies the MAC address of the victim's computer


ii) Deletes the MAC address of the victim's computer
iii) An attacker desynchronizes a series of packets between the source and destination computer
iv) Extra packets sent to one of the victims force the victim to choose which packet to accept

Options:
A) i, ii only
B) ii, iii, iv only
C) iii, iv
D) i, ii, iii, iv
Answer: C) iii, iv
Explanation: Hijacking involves desynchronizing packets (iii) and forcing the victim to accept malicious
packets (iv).

7. IP Security architecture provides

i) Encryption of user data for privacy


ii) Authentication of the integrity of a message
iii) Protection against replay attacks
iv) Authentication for the attacker's machine

Options:
A) i, ii only
B) i, ii, iii only
C) i, ii, iii, iv
D) ii, iii, iv only

Answer: B) i, ii, iii only


Explanation: IPsec provides encryption (i), integrity (ii), and replay protection (iii), but not authentication
for attackers (iv).

8. Methods to decrease vulnerabilities in TCP/IP include

i) Modify default timer values


ii) Increase the number of simultaneous connections that a computer can handle
iii) Install an antivirus on the system
iv) Modify the sequence numbers of the packets

Options:
A) i, ii, iii only
B) ii, iii, iv
C) ii, iii
D) iii, iv only

Answer: A) i, ii, iii only


Explanation: Modifying timers (i), increasing connections (ii), and antivirus (iii) help security. Changing
sequence numbers (iv) is not a valid method.

9. In an ARP test on a network, the Windows driver for the network card

A) Detects all hackers on the network


B) Detects the IP addresses of all computers linked to the network
C) Examines the contents of the hard disk of the main server for the network
D) Examines only the first octet of the MAC address to determine whether it is a broadcast packet

Answer: B) Detects the IP addresses of all computers linked to the network


Explanation: ARP resolves IP addresses to MAC addresses on the local network.

10. To avoid or defend against IP spoofing, users must

i) Avoid trust relationships that rely upon IP address only


ii) Encrypt the IP addresses in use
iii) Change the permissions on the Systemroot hosts file to allow read-only access on Windows systems
iv) Not allow hackers to guess sequence numbers on their systems

Options:
A) i, ii, iii only
B) ii, iii, iv only
C) ii, iv only
D) i, iii only

Answer: D) i, iii only


Explanation: Avoiding IP-based trust (i) and securing the hosts file (iii) are key defenses.

11. The decoy method of detecting sniffers involves

i) Setting up a client and server on either side of the network


ii) Configuring the server with accounts that do not have rights or privileges
iii) Involves configuring firewalls to prevent hackers
iv) Involves backing up all files on the main server within the network

Options:
A) i, ii
B) ii, iii, iv
C) ii, iii
D) i, ii, iii, iv

Answer: A) i, ii
Explanation: The decoy method uses fake accounts (ii) and monitors unauthorized access attempts (i).

12. The command to check if a sniffer is in promiscuous mode is:

A) -/der config-d
B) -/ifconfig -a
C) -/ps aux -a
D) -c /-ipconfig -d

Answer: B) -/ifconfig -a
Explanation: ifconfig -a (Unix/Linux) or ipconfig /all (Windows) can show promiscuous mode status.

13. Motivation for hacking includes

i) Desire for recognition or fame


ii) Desire to spread spam or virus
iii) Revenge
iv) Intent to commit industrial espionage

Options:
A) i, ii
B) i, ii, iii
C) ii, iii, iv
D) i, ii, iii, iv

Answer: D) i, ii, iii, iv


Explanation: Hackers may be motivated by fame (i), malice (ii, iii), or espionage (iv).

14. An ethical hacker is

A) A security professional who applies hacking skills for defensive purposes


B) One who uses hacking skills for teaching others how to hack
C) A hacker who distributes trojans and worms on the World Wide Web
D) A hacker who hacks only attackers of secure networks

Answer: A) A security professional who applies hacking skills for defensive purposes
Explanation: Ethical hackers use skills to improve security.

15. Blackhat hackers hack websites and networks with

A) Display valuable information


B) Display information with a bad intent
C) Hack with good intent
D) Hack sites with insufficient information

Answer: B) Display information with a bad intent


Explanation: Blackhat hackers act maliciously.
16. Sniffers can be implemented from

i) Any computer within a network


ii) At the gateway
iii) At the routers
iv) The central processing unit

Options:
A) i
B) i, ii
C) i, ii, iii
D) i, ii, iii, iv

Answer: C) i, ii, iii


Explanation: Sniffers can operate from any network device (i-iii), but not the CPU (iv).

17. Sniffers look only at the traffic passing through the

A) Network Interface adapter on the machine the application is running on


B) Network adaptor and the RAM on the machine the sniffer is resident on
C) Data passing through the buffer unit of the computer
D) Hard disk in the machine the sniffer is running on

Answer: A) Network Interface adapter on the machine the application is running on


Explanation: Sniffers capture traffic at the network interface level.

18. To spoof a trusted machine relationship, the attacker must

i) Identify the target pair of trusted machines


ii) Anesthetize the host the attacker intends to impersonate
iii) Forge the address of the host the attacker is pretending to be
iv) Accurately guess the correct sequence of all TCP/IP transmissions

Options:
A) i and ii only
B) ii, iii, and iv only
C) iii and iv
D) i, ii, iii, and iv

Answer: D) i, ii, iii, and iv


Explanation: Spoofing requires identifying targets (i), disabling the host (ii), forging addresses (iii), and
guessing sequences (iv).
19. In an IP spoofing attack, a tangible loss may occur when

A) Spam or SYN flooding occurs on the network under attack


B) Valuable data is lost or duplicated
C) The network is slowed down by the attacker
D) The reputation of the victim is compromised

Answer: B) Valuable data is lost or duplicated


Explanation: Spoofing can lead to data theft or corruption.

20. Blind spoofing is where the

A) Hacker is not aware of all network conditions but uses various means to gain access
B) Victim is not aware that he or she is being hacked
C) Victim's firewall cannot detect the attacker
D) Attacker can attack the victim without being detected

Answer: A) Hacker is not aware of all network conditions but uses various means to gain access
Explanation: Blind spoofing occurs when the attacker lacks full network visibility.

21. Damage caused by a Trojan horse includes

i) Erasing or overwriting data


ii) Re-installing itself after being disabled
iii) Copying fake links leading to false websites
iv) Rewriting the URL of the victim's address

Options:
A) i and ii
B) ii, iii, and iv
C) i, ii, iii, and iv
D) i, ii, iii

Answer: C) i, ii, iii, and iv


Explanation: Trojans can cause all these damages.

22. A Trojan horse attack can be cleared by using

i) Antivirus software
ii) Booting from a live CD and then using antivirus
iii) Resetting jumpers on the motherboard
iv) Updating the firewall
Options:
A) i, ii
B) ii, iii
C) i, ii, iii
D) i, ii, iv

Answer: A) i, ii
Explanation: Antivirus (i) and live CD cleaning (ii) are effective.

23. The best way to clean a heavily infected computer is to

A) Reformat the hard disk and reinstall the OS


B) Clean the computer with an antivirus
C) Prevent other users from using the affected files
D) Delete all unfamiliar files on the hard disk

Answer: A) Reformat the hard disk and reinstall the OS


Explanation: A full wipe ensures complete removal of malware.

24. Defenses against man-in-the-middle attacks include

i) Public key and secret key infrastructure


ii) Avoiding unsecured wireless
iii) Use of strong passwords
iv) Off-channel verification

Options:
A) i, ii
B) ii, iii
C) i, ii, iv
D) i, ii, iii, iv

Answer: C) i, ii, iv
Explanation: Encryption (i), secure networks (ii), and off-channel checks (iv) help prevent MITM.

25. A closed-form solution to security works well when:

A) Breaking the system into smaller components


B) Zipping files
C) Using a powerful firewall
D) Using intelligent switches and routers
Answer: A) Breaking the system into smaller components
Explanation: Modular security improves manageability.

26. Computers left intentionally vulnerable to attack are called:

A) Secure systems
B) Operating Systems
C) Honeypots
D) Proxies

Answer: C) Honeypots
Explanation: Honeypots lure attackers for analysis.

27. In an active spoofing attack, the hacker can

i) See all computers on the victim's network


ii) Hack an unsecured document
iii) Guess all TCP/IP sequence numbers
iv) See source/destination nodes and alter packets

Options:
A) i, ii
B) ii, iii
C) i, iv
D) ii, iii, iv

Answer: C) i, iv
Explanation: Active spoofing involves network visibility (i) and packet manipulation (iv).

28. ARP spoofing involves

i) Detecting broadcasts, faking IP, and responding with the hacker's MAC
ii) Deleting the victim's address
iii) Replacing the victim's IP with their host address
iv) Copying the victim's password

Options:
A) i, ii
B) ii, iii, iv
C) i only
D) i, iv
Answer: C) i only
Explanation: ARP spoofing fakes IP-to-MAC mappings (i).

29. In web spoofing, a hacker spoofs

i) The host's router and gateway


ii) Redirects information to a virtual server
iii) Spoofs an IP and acquires a certificate
iv) Freezes the victim's website

Options:
A) i, ii
B) ii, iii
C) i, ii, iii
D) i, ii, iv

Answer: B) ii, iii


Explanation: Web spoofing involves redirection (ii) and fake certificates (iii).

30. In DNS spoofing, the hacker changes the website's IP to:

A) The hacker's computer


B) The victim's computer
C) The victim's MAC address
D) The victim's network proxy server

Answer: A) The hacker's computer


Explanation: DNS spoofing redirects traffic to the attacker's IP.

31. Apsend (a spoofing tool) can perform:

i) SYN flood
ii) UDP flood
iii) Ping attack
iv) Time-to-Live attack

Options:
A) i, ii
B) ii, iii
C) i, ii, iii
D) i, ii, iii, iv
Answer: C) i, ii, iii
Explanation: Apsend can execute SYN, UDP, and ping attacks.

32. Baiting relies mainly on:

A) The skill of the attacker


B) The intensity of spam
C) The curiosity or greed of the victim
D) The effectiveness of the victim's firewall

Answer: C) The curiosity or greed of the victim


Explanation: Baiting exploits human psychology.

34. In a man-in-the-middle attack, the attacker:

A) Attacks centrally placed computers


B) Attacks the victim's hard disk and NIC
C) Eavesdrops, relays, and alters transmitted data
D) Disables all network computers

Answer: C) Eavesdrops, relays, and alters transmitted data


Explanation: MITM involves intercepting and modifying communications.

35. A form of malware that appears legitimate but performs malicious functions is:

A) Eavesdropping
B) Flooding
C) Spamming
D) Trojan horse

Answer: D) Trojan horse


Explanation: Trojans disguise malicious actions as legitimate software.

36. Types of Trojan payloads include:

i) Remote access
ii) Data destruction and security disabler
iii) Downloader
iv) Denial-of-service
Options:
A) i, ii
B) ii, iii
C) i, ii, iii
D) i, ii, iii, iv

Answer: D) i, ii, iii, iv


Explanation: Trojans can perform all these actions.

40. A limitation of network intrusion detection is:

A) Operating the network at high speed


B) Operating the network at slow speed
C) Having too many clients
D) Installing a firewall and antivirus

Answer: A) Operating the network at high speed


Explanation: High-speed networks challenge real-time intrusion detection.

41. Security policy considerations for a website include:

A) Limiting visitor use


B) Administering from the web host console
C) Installing spyware at the admin end
D) Using a reliable network topology

Answer: D) Using a reliable network topology


Explanation: A secure network design is fundamental.

42. Router exploits by hackers include:

i) Port scans to discover open ports


ii) Determining the victim's OS and CPU speed
iii) Modifying TTL and firewall settings
iv) Changing the baud rate of the medium

Options:
A) i, ii
B) ii, iii
C) i, ii, iii
D) i, ii, iii, iv
Answer: C) i, ii, iii
Explanation: Hackers exploit ports (i), OS info (ii), and TTL/firewall changes (iii).

43. A Windows post-installation security method is:

A) Apply all patches and never use blank passwords


B) Disable unused desktop icons
C) Restrict domain server access
D) Disable clients with excessive logon attempts

Answer: A) Apply all patches and never use blank passwords


Explanation: Patching and strong passwords are critical.

44. A DoS attack can be prevented by:

A) Filtering frequent patterns and implementing security policies


B) Sending destructive JavaScript to the attacker
C) Rewriting the computer's URL
D) Using software subversion

Answer: A) Filtering frequent patterns and implementing security policies


Explanation: Proactive filtering and policies mitigate DoS.

46. In connection hijacking:

A) An attacker desynchronizes packets between source and destination


B) An attacker prevents the victim from connecting
C) An attacker destroys the victim's server
D) An attacker forces a shutdown

Answer: A) An attacker desynchronizes packets between source and destination


Explanation: Hijacking disrupts packet flow.

47. In RIP attacks:

A) Attacks destroy the victim's router


B) Attacks change data destinations
C) Attacks disorganize packet sequences
D) Attacks delete routing tables
Answer: D) Attacks delete routing tables
Explanation: RIP attacks corrupt routing information.

48. Important TCP/IP timers for security are:

A) Connection Establishment, WAIT, KEEP ALIVE, FIN, ACK


B) Connection Establishment, ACK, KEEP ALIVE, WAIT, FIN
C) Connection Establishment, KEEP ALIVE, ACK, WAIT, FIN
D) Connection Establishment, FIN WAIT, TIME_WAIT, KEEP ALIVE

Answer: D) Connection Establishment, FIN WAIT, TIME_WAIT, KEEP ALIVE


Explanation: These timers manage connection states securely.

49. TCP/IP vulnerabilities include:

A) RIP routing table attacks


B) UDP header attacks
C) TCP SYN attacks and IP spoofing
D) Trojan and worm attacks

Answer: C) TCP SYN attacks and IP spoofing


Explanation: SYN floods and spoofing exploit TCP/IP weaknesses.

50. IP Security provides:

A) Authentic addresses to MITM victims


B) Virus-free packets to attackers
C) Authentication of message integrity
D) Prevents password decryption

Answer: C) Authentication of message integrity


Explanation: IPsec ensures data integrity and authenticity.

You might also like