0

Information/Network Security

Description: Ethical Hacking useful test for Network security
Number of Questions: 16
Created by:
Tags: Security Ethical hacking IT Companies B. Tech. Data Sufficiency
Attempted 0/16 Correct 0 Score 0

Which of the following attacks is called “evil twin”? Wireless attacks are pretty simple.

  1. ARP poisoning

  2. MAC spoofing

  3. Rogue access point

  4. Session hijacking

  5. Sniffers


Correct Option: C
Explanation:

Evil twin attack involves a rogue Ap to steal information.

What is the preferred communications method used with systems on a bot-net?

  1. E-mail

  2. ICMP

  3. SNMP

  4. IRC

  5. TFTP


Correct Option: D
Explanation:

IRC is the perfect one to communicate.

What does the program EliteWrap do?

Knowledge of tools in every facet of pen testing is vital

  1. Binds trojans to legitimate files for exploitation later

  2. Provides secure, encrypted tunneling between hosts

  3. Provides proxy services to obfuscate source IP

  4. Provides services to zombie systems

  5. It cam import code easily between different operating systems.


Correct Option: A
Explanation:

Elite wrap binds trojans to legitimate files for exploitation later

Which of the following best describes a distributed denial-of-service attack?

  1. A DOS against multiple systems across an enterprise network.

  2. A DOS against an entire subnet, affecting multiple systems.

  3. A DOS against an entire network.

  4. A DOS carried out by multiple systems.

  5. A DOS against similar systems in different target networks.


Correct Option: D
Explanation:

Yes, DOS Is carried out at multiple systems for the target.

Which of the following is a passive wireless discovery tool?

  1. NetStumbler

  2. Kismet

  3. KisMac

  4. Aircrack

  5. Netsniff


Correct Option: B
Explanation:

Kismet is a passive wireless discovery tool.

When the target system is behind a firewall, using hping2, the student crafts SYN packets to send with a hop count capable of reaching the host. The student then sends these packets out with port numbers from 1 to 1024. What action is he performing?

  1. Firewalling

  2. Firewalking

  3. XMAS scan

  4. Passive footprinting

  5. None of the above


Correct Option: E
Explanation:

Yes, none of the option is correct.

A student is assigned to begin testing on a particular subnet. On examination of the segment, he notices the network is fully switched. Which of the following would allow him to begin sniffing traffic to or from devices on the subnet?

  1. Use sniffer to begin connecting

  2. Use nmap to begin a port scan

  3. Use snort to view all packets

  4. Use etherflood to create a MAC flood

  5. None of the above


Correct Option: D
Explanation:

Since the subnet is fully switched an attacker would need a force to switch to forward traffic to the port he is attached to.

Port forwarding or port mapping is a name given to the combined technique of ___________.

  1. translating the address, packet filter and forwarding

  2. check for the opened ports n scan the ports

  3. getting the IP address

  4. botnets collection

  5. use TCP protocol to transfer


Correct Option: A
Explanation:

Translating the address and/or port number of a packet to a new destination possibly accepting such packet in a packet filter and  (firewall)forwarding the packet according to the routing table.

What will be an open port return from an ACK scan?

  1. TCP scan

  2. NMAP

  3. FIN

  4. SYN/ACK

  5. RST


Correct Option: E
Explanation:

RST Port is opened from an  ACK scan.

Scanning is performed in which phase of a pen test? Pen-test steps are different from the five hacking steps.

  1. Attack

  2. Pre-attack

  3. Reconnaissance

  4. Post-attack

  5. Man in the middle attack


Correct Option: B
Explanation:

Scanning takes place in Pre-attack phase.

What is TKIP and how does it make WPA-2 a better security choice for your wireless network?

  1. Temporary Key Integration Protocol. It forces a key change every time a bit is sent.

  2. Temporary Key Integration Protocol. It forces a key change every 10,000 packets or so.

  3. Temporal Key Integrity Protocol. It forces a key change after every 10,000 packets or so.

  4. Transparent Key Internal protocol. It forces a key change after every 100 packets or so.

  5. Temporal Key Integrity Protocol. It forces a key change every time a bit is sent.


Correct Option: C
Explanation:

TKIP is the acronym and it is correct.

What is the maximum length of an SSID?

  1. 32 characters

  2. 16 characters

  3. 8 characters

  4. 48 characters

  5. 64 characters


Correct Option: A
Explanation:

Yes SSID id 32 characters long.

Which of the following is true regarding WEP cracking?

Considering the efforts needed to crack something, only one of these answers makes sense.

  1. Initialization vectors are small, get reused frequently, but are encrypted during transmission.

  2. Initialization vectors are small, get reused frequently, and are sent in cleartext.

  3. Initialization vectors are large, get reused frequently, but are encrypted during transmission.

  4. Initialization vectors are little, get reused frequently, but are encrypted during transmission.

  5. Initialization vectors are large, get reused frequently, and are sent in cleartext.


Correct Option: B
Explanation:

WEP cracking Initialization vectors are small, get reused frequently, and are sent in cleartext.

What is another term for turning off the SSID broadcast?

Another wireless definition term to memorize

  1. SSID stealth

  2. SSID unicast

  3. SSID cloaking

  4. SSID min

  5. SSID Sec


Correct Option: C
Explanation:

Network cloaking is a wireless security  measure achieved by hiding the network name from being broadcast in public.

Which wireless mode connects machines directly to one another, without the use of an access point?

  1. Infrastructure

  2. Point to point

  3. ESS

  4. BSS

  5. Ad hoc


Correct Option: E
Explanation:

Adhoc connects directly with out any AP.

Which wireless standard can operate at speeds of 100 + Mbps and uses the 2.4GHz to 5GHz range?

  1. 802.11a

  2. 802.11b

  3. 802.11g

  4. 802.11i

  5. 802.11n


Correct Option: E
Explanation:

802.11n can cross signal across much of range attaining speeds of 100Mbps.

- Hide questions