0 of 50 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Current
Review
Answered
Correct
Incorrect
Question 1 of 50
1 point(s)
Vulnerability Database launched by NIST is:
Question 2 of 50
1 point(s)
Which of the following is not a Vulnerability Scanning tool?
Question 3 of 50
1 point(s)
Which of the following is not an example of Non-Electronic / Non-Technical Password
Attacks?
Question 4 of 50
1 point(s)
Bob is cracking a password using the list of known and common phrases until the
password is accepted. Which type of attack is this?
Question 5 of 50
1 point(s)
An attacker is cracking the password by trying every possible combination of alpha-
numeric characters, which of the following type of Password Cracking is this?
Question 6 of 50
1 point(s)
Addition of characters in the password to make it one-way function is called
Question 7 of 50
1 point(s)
Which of the following is a framework that can perform automated attacks on
services, applications, port & unpatched software?
Question 8 of 50
1 point(s)
Cracking password with precomputed hashes is
Question 9 of 50
1 point(s)
How can you mitigate Rainbow table attack?
Question 10 of 50
1 point(s)
Which of the following statement is the appropriate definition of malware?
Question 11 of 50
1 point(s)
Which of the following does not belongs to the virus?
Question 12 of 50
1 point(s)
Malware Static Analysis is
Question 13 of 50
1 point(s)
Malware Dynamic Analysis
Question 14 of 50
1 point(s)
Which of the following does not belongs to Trojan deployment?
Question 15 of 50
1 point(s)
Following is used to hide malicious program while creating Trojan
Question 16 of 50
1 point(s)
Following is used to bind malicious program while creating Trojan
Question 17 of 50
1 point(s)
Following is used to drop malicious program at the target
Question 18 of 50
1 point(s)
Sniffing is performed over
Question 19 of 50
1 point(s)
Sniffing without interfering is known as
Question 20 of 50
1 point(s)
The port which allows you to send a copy of packet over another port at layer 2 is
called
Question 21 of 50
1 point(s)
Wiretapping with legal authorization is called
Question 22 of 50
1 point(s)
Which is the best option to defend against ARP poisoning
Question 23 of 50
1 point(s)
A phishing attack is performed over
Question 24 of 50
1 point(s)
Basic Purpose of Social Engineering attacks are
Question 25 of 50
1 point(s)
Which of the following is not a type of Human-based Social Engineering?
Question 26 of 50
1 point(s)
Attack performed by a disgruntled employee of an organization is called
Question 27 of 50
1 point(s)
To defend against phishing attack, the necessary step is
Question 28 of 50
1 point(s)
The technique of passing restricted area of an unauthorized person with an authorized
person is called
Question 29 of 50
1 point(s)
The technique of passing restricted area of an unauthorized person by following an
authorized person is called
Question 30 of 50
1 point(s)
Which of the following Wireshark filter displays packet from 10.0.0.1?
Question 31 of 50
1 point(s)
An attack, which denied the services, and resources become unavailable for legitimate
users is known as
Question 32 of 50
1 point(s)
DoS attack in which flooding of the request overloads web application or web server is
known as
Question 33 of 50
1 point(s)
DoS Attack focused on hardware sabotage is known as
Question 34 of 50
1 point(s)
DoS attack in which intermediary and Secondary victims are also involved in the
process of launching a DoS attack is known as:
Question 35 of 50
1 point(s)
Scanning technique with a list of potentially vulnerable machines is known as
Question 36 of 50
1 point(s)
Scanning any IP address from IP address Space for vulnerabilities is called
Question 37 of 50
1 point(s)
When an attacker directly exploits and Copy the malicious code to the victim’s
machine, the propagation is:
Question 38 of 50
1 point(s)
When an attacker exploits the vulnerable system, and open a connection to transfer
malicious code, the propagation is called
Question 39 of 50
1 point(s)
An automated process of detecting DoS/DDoS attacks by analysis of input signals is
called
Question 40 of 50
1 point(s)
Sequential Change-Point detection algorithm uses the following technique to detect
DoS/DDoS attack
Question 41 of 50
1 point(s)
Following Filtering Standard is designed for Ingress filtering for multi-homed
networks to limit the DDoS attacks.
Question 42 of 50
1 point(s)
The process of silently dropping the traffic (either incoming or outgoing traffic) so
that the source is not notified about discarding of the packet.
Question 43 of 50
1 point(s)
Which statement defines session hijacking most accurately?
Question 44 of 50
1 point(s)
Which of the following does not belongs to Session hijacking attack?
Question 45 of 50
1 point(s)
In Session hijacking, a technique is used to send packets via specific route, i.e.,
identical to victim’s path, this technique is known as
Question 46 of 50
1 point(s)
Session Fixation is vulnerable to
Question 47 of 50
1 point(s)
HIDS is deployed to monitor activities on the following
Question 48 of 50
1 point(s)
A computer system is placed in between public and private network, certain roles and
responsibilities are assigned to this computer to perform. This System is known as
Question 49 of 50
1 point(s)
Cisco ASA with FirePOWER Services is an example of
Question 50 of 50
1 point(s)
The devices or system that are deployed to trap attackers attempting to gain
unauthorized access to the system or network as they are deployed in an isolated
environment and being monitored are known as