Information/Network Security
Description: Ethical Hacking useful test for Network security | |
Number of Questions: 16 | |
Created by: Preeti Dasgupta | |
Tags: Security Ethical hacking IT Companies B. Tech. Data Sufficiency |
Which of the following attacks is called “evil twin”? Wireless attacks are pretty simple.
What is the preferred communications method used with systems on a bot-net?
What does the program EliteWrap do?
Knowledge of tools in every facet of pen testing is vital
Which of the following best describes a distributed denial-of-service attack?
Which of the following is a passive wireless discovery tool?
When the target system is behind a firewall, using hping2, the student crafts SYN packets to send with a hop count capable of reaching the host. The student then sends these packets out with port numbers from 1 to 1024. What action is he performing?
A student is assigned to begin testing on a particular subnet. On examination of the segment, he notices the network is fully switched. Which of the following would allow him to begin sniffing traffic to or from devices on the subnet?
Port forwarding or port mapping is a name given to the combined technique of ___________.
What will be an open port return from an ACK scan?
Scanning is performed in which phase of a pen test? Pen-test steps are different from the five hacking steps.
What is TKIP and how does it make WPA-2 a better security choice for your wireless network?
What is the maximum length of an SSID?
Which of the following is true regarding WEP cracking?
Considering the efforts needed to crack something, only one of these answers makes sense.
What is another term for turning off the SSID broadcast?
Another wireless definition term to memorize
Which wireless mode connects machines directly to one another, without the use of an access point?
Which wireless standard can operate at speeds of 100 + Mbps and uses the 2.4GHz to 5GHz range?