Supercharge Your Skills with Our Annual Premium Plan! 🚀 Unlock Unlimited Access to Essential Tech Courses 📚 for Just $160 $70/Year . Subscribe Now!
Which of the following is not a Vulnerability Scanning tool?
Correct
Incorrect
Question 3 of 50
3. Question
1 point(s)
Which of the following is not an example of Non-Electronic / Non-Technical Password
Attacks?
Correct
Incorrect
Question 4 of 50
4. Question
1 point(s)
Bob is cracking a password using the list of known and common phrases until the
password is accepted. Which type of attack is this?
Correct
Incorrect
Question 5 of 50
5. Question
1 point(s)
An attacker is cracking the password by trying every possible combination of alpha-
numeric characters, which of the following type of Password Cracking is this?
Correct
Incorrect
Question 6 of 50
6. Question
1 point(s)
Addition of characters in the password to make it one-way function is called
Correct
Incorrect
Question 7 of 50
7. Question
1 point(s)
Which of the following is a framework that can perform automated attacks on
services, applications, port & unpatched software?
Correct
Incorrect
Question 8 of 50
8. Question
1 point(s)
Cracking password with precomputed hashes is
Correct
Incorrect
Question 9 of 50
9. Question
1 point(s)
How can you mitigate Rainbow table attack?
Correct
Incorrect
Question 10 of 50
10. Question
1 point(s)
Which of the following statement is the appropriate definition of malware?
Correct
Incorrect
Question 11 of 50
11. Question
1 point(s)
Which of the following does not belongs to the virus?
Correct
Incorrect
Question 12 of 50
12. Question
1 point(s)
Malware Static Analysis is
Correct
Incorrect
Question 13 of 50
13. Question
1 point(s)
Malware Dynamic Analysis
Correct
Incorrect
Question 14 of 50
14. Question
1 point(s)
Which of the following does not belongs to Trojan deployment?
Correct
Incorrect
Question 15 of 50
15. Question
1 point(s)
Following is used to hide malicious program while creating Trojan
Correct
Incorrect
Question 16 of 50
16. Question
1 point(s)
Following is used to bind malicious program while creating Trojan
Correct
Incorrect
Question 17 of 50
17. Question
1 point(s)
Following is used to drop malicious program at the target
Correct
Incorrect
Question 18 of 50
18. Question
1 point(s)
Sniffing is performed over
Correct
Incorrect
Question 19 of 50
19. Question
1 point(s)
Sniffing without interfering is known as
Correct
Incorrect
Question 20 of 50
20. Question
1 point(s)
The port which allows you to send a copy of packet over another port at layer 2 is
called
Correct
Incorrect
Question 21 of 50
21. Question
1 point(s)
Wiretapping with legal authorization is called
Correct
Incorrect
Question 22 of 50
22. Question
1 point(s)
Which is the best option to defend against ARP poisoning
Correct
Incorrect
Question 23 of 50
23. Question
1 point(s)
A phishing attack is performed over
Correct
Incorrect
Question 24 of 50
24. Question
1 point(s)
Basic Purpose of Social Engineering attacks are
Correct
Incorrect
Question 25 of 50
25. Question
1 point(s)
Which of the following is not a type of Human-based Social Engineering?
Correct
Incorrect
Question 26 of 50
26. Question
1 point(s)
Attack performed by a disgruntled employee of an organization is called
Correct
Incorrect
Question 27 of 50
27. Question
1 point(s)
To defend against phishing attack, the necessary step is
Correct
Incorrect
Question 28 of 50
28. Question
1 point(s)
The technique of passing restricted area of an unauthorized person with an authorized
person is called
Correct
Incorrect
Question 29 of 50
29. Question
1 point(s)
The technique of passing restricted area of an unauthorized person by following an
authorized person is called
Correct
Incorrect
Question 30 of 50
30. Question
1 point(s)
Which of the following Wireshark filter displays packet from 10.0.0.1?
Correct
Incorrect
Question 31 of 50
31. Question
1 point(s)
An attack, which denied the services, and resources become unavailable for legitimate
users is known as
Correct
Incorrect
Question 32 of 50
32. Question
1 point(s)
DoS attack in which flooding of the request overloads web application or web server is
known as
Correct
Incorrect
Question 33 of 50
33. Question
1 point(s)
DoS Attack focused on hardware sabotage is known as
Correct
Incorrect
Question 34 of 50
34. Question
1 point(s)
DoS attack in which intermediary and Secondary victims are also involved in the
process of launching a DoS attack is known as:
Correct
Incorrect
Question 35 of 50
35. Question
1 point(s)
Scanning technique with a list of potentially vulnerable machines is known as
Correct
Incorrect
Question 36 of 50
36. Question
1 point(s)
Scanning any IP address from IP address Space for vulnerabilities is called
Correct
Incorrect
Question 37 of 50
37. Question
1 point(s)
When an attacker directly exploits and Copy the malicious code to the victim’s
machine, the propagation is:
Correct
Incorrect
Question 38 of 50
38. Question
1 point(s)
When an attacker exploits the vulnerable system, and open a connection to transfer
malicious code, the propagation is called
Correct
Incorrect
Question 39 of 50
39. Question
1 point(s)
An automated process of detecting DoS/DDoS attacks by analysis of input signals is
called
Correct
Incorrect
Question 40 of 50
40. Question
1 point(s)
Sequential Change-Point detection algorithm uses the following technique to detect
DoS/DDoS attack
Correct
Incorrect
Question 41 of 50
41. Question
1 point(s)
Following Filtering Standard is designed for Ingress filtering for multi-homed
networks to limit the DDoS attacks.
Correct
Incorrect
Question 42 of 50
42. Question
1 point(s)
The process of silently dropping the traffic (either incoming or outgoing traffic) so
that the source is not notified about discarding of the packet.
Correct
Incorrect
Question 43 of 50
43. Question
1 point(s)
Which statement defines session hijacking most accurately?
Correct
Incorrect
Question 44 of 50
44. Question
1 point(s)
Which of the following does not belongs to Session hijacking attack?
Correct
Incorrect
Question 45 of 50
45. Question
1 point(s)
In Session hijacking, a technique is used to send packets via specific route, i.e.,
identical to victim’s path, this technique is known as
Correct
Incorrect
Question 46 of 50
46. Question
1 point(s)
Session Fixation is vulnerable to
Correct
Incorrect
Question 47 of 50
47. Question
1 point(s)
HIDS is deployed to monitor activities on the following
Correct
Incorrect
Question 48 of 50
48. Question
1 point(s)
A computer system is placed in between public and private network, certain roles and
responsibilities are assigned to this computer to perform. This System is known as
Correct
Incorrect
Question 49 of 50
49. Question
1 point(s)
Cisco ASA with FirePOWER Services is an example of
Correct
Incorrect
Question 50 of 50
50. Question
1 point(s)
The devices or system that are deployed to trap attackers attempting to gain
unauthorized access to the system or network as they are deployed in an isolated
environment and being monitored are known as
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.