Which of the following is not appropriate for IDS evasion?
Correct
Incorrect
Question 2 of 50
2. Question
1 point(s)
Sending Split packet out-of-order with delay is an example of
Correct
Incorrect
Question 3 of 50
3. Question
1 point(s)
Which of the following is not a type of Open Source Web Server architecture?
Correct
Incorrect
Question 4 of 50
4. Question
1 point(s)
An attacker is attempting trial and error method to access restricted directories using
dots and slash sequences. Which type of Web server attack is this?
Correct
Incorrect
Question 5 of 50
5. Question
1 point(s)
An attacker sends a request which allows him to add header response; now he
redirects the user to a malicious website. Which type of attack is this?
Correct
Incorrect
Question 6 of 50
6. Question
1 point(s)
Update that is specially designed to fix the issue for a live production environment is
called
Correct
Incorrect
Question 7 of 50
7. Question
1 point(s)
A piece of Software developed to fix an issue
Correct
Incorrect
Question 8 of 50
8. Question
1 point(s)
Which of the following is Patch Management tool?
Correct
Incorrect
Question 9 of 50
9. Question
1 point(s)
Individual who is responsible for the management and configuration required for the
web application is called
Correct
Incorrect
Question 10 of 50
10. Question
1 point(s)
Which of the Following is not a Back-end Programming language?
Correct
Incorrect
Question 11 of 50
11. Question
1 point(s)
Which of the Following is not a Front-end Programming language?
Correct
Incorrect
Question 12 of 50
12. Question
1 point(s)
Web Applications working is categorized into the following three basic layers:
Correct
Incorrect
Question 13 of 50
13. Question
1 point(s)
An attacker has accessed the web application. Now, he is escalating privileges to
access sensitive information. Which type of web application attack is this?
Correct
Incorrect
Question 14 of 50
14. Question
1 point(s)
Which of the following is not appropriate for Data Connectivity attack between
application and its database?
Correct
Incorrect
Question 15 of 50
15. Question
1 point(s)
Inferential Injection is also called as
Correct
Incorrect
Question 16 of 50
16. Question
1 point(s)
An attack is using same communication channel to launch the injection attack and
gather information from the response. Which type of SQL injection is being
performed?
Correct
Incorrect
Question 17 of 50
17. Question
1 point(s)
Which SQL statement is used to extract data from a database?
Correct
Incorrect
Question 18 of 50
18. Question
1 point(s)
Which SQL statement is used to update data in a database?
Correct
Incorrect
Question 19 of 50
19. Question
1 point(s)
What does SQL stand for?
Correct
Incorrect
Question 20 of 50
20. Question
1 point(s)
Name of Access Point that is usually broadcasting for the identification of wireless
network is called
Correct
Incorrect
Question 21 of 50
21. Question
1 point(s)
In a Wi-Fi Network with Open Authentication, how many frames are communicated
between client and AP to complete authentication process?
Correct
Incorrect
Question 22 of 50
22. Question
1 point(s)
In a Wi-Fi Network with Shared Key Authentication, how many frames are
communicated between client and AP to complete authentication process?
Correct
Incorrect
Question 23 of 50
23. Question
1 point(s)
Wi-Fi authentication with centralized authentication server deployed using
Correct
Incorrect
Question 24 of 50
24. Question
1 point(s)
Doughnut Shaped Radiation pattern is obtained from
Correct
Incorrect
Question 25 of 50
25. Question
1 point(s)
Which Wireless encryption uses 24-bit Initialization Vector to create RC4 with CRC?
Correct
Incorrect
Question 26 of 50
26. Question
1 point(s)
Which of the following protocol ensures per packet key by dynamically generating a
128-bit key?
Correct
Incorrect
Question 27 of 50
27. Question
1 point(s)
In Bluetooth network, target devices are overflowed by random packets. Which type of
Bluetooth attack is this?
Correct
Incorrect
Question 28 of 50
28. Question
1 point(s)
The attacker is attempting to gain remote access to a Bluetooth device to compromise
its security, which type of attack is this?
Correct
Incorrect
Question 29 of 50
29. Question
1 point(s)
Which of the following tool is appropriate for packet sniffing in a wireless network?
Correct
Incorrect
Question 30 of 50
30. Question
1 point(s)
Which device can detect rogue wireless access point?
Correct
Incorrect
Question 31 of 50
31. Question
1 point(s)
Jailbreaking refers to:
Correct
Incorrect
Question 32 of 50
32. Question
1 point(s)
When an iOS device is rebooted, it will no longer have a patched kernel, may stick in a
partially started state. Which type of Jailbreaking is performed on it?
Correct
Incorrect
Question 33 of 50
33. Question
1 point(s)
Official Application store for Blackberry platform is
Correct
Incorrect
Question 34 of 50
34. Question
1 point(s)
Which is the most appropriate solution if an administrator is requires monitoring and
control over mobile devices running on a corporate network?
Correct
Incorrect
Question 35 of 50
35. Question
1 point(s)
How many layers are there in an architecture of IoT?
Correct
Incorrect
Question 36 of 50
36. Question
1 point(s)
Which layer in IoT architecture is responsible for device and information
management?
Correct
Incorrect
Question 37 of 50
37. Question
1 point(s)
Which SQL Query is correct to extract only “UserID” field from the “Employees” table in the database?
Correct
Incorrect
Question 38 of 50
38. Question
1 point(s)
Which layer is responsible for Protocol translation and messaging?
Correct
Incorrect
Question 39 of 50
39. Question
1 point(s)
IoT device directly communicating with the application server is:
Correct
Incorrect
Question 40 of 50
40. Question
1 point(s)
An eavesdropper records the transmission and replays it at a later time to cause the
receiver to ‘unlock’, this attack is known as:
Correct
Incorrect
Question 41 of 50
41. Question
1 point(s)
IaaS Cloud Computing Service offers
Correct
Incorrect
Question 42 of 50
42. Question
1 point(s)
Following is an example of SaaS
Correct
Incorrect
Question 43 of 50
43. Question
1 point(s)
Cloud deployment model accessed by multiple parties having shared resources is a:
Correct
Incorrect
Question 44 of 50
44. Question
1 point(s)
A person or organization that maintains a business relationship with, and uses service
from Cloud Providers is known as
Correct
Incorrect
Question 45 of 50
45. Question
1 point(s)
A person who negotiates the relationship between Cloud Provider & Consumer is
called
Correct
Incorrect
Question 46 of 50
46. Question
1 point(s)
Symmetric Key Cryptography requires
Correct
Incorrect
Question 47 of 50
47. Question
1 point(s)
AES & DES are the examples of
Correct
Incorrect
Question 48 of 50
48. Question
1 point(s)
The cipher that encrypts the plain text one by one is known as
Correct
Incorrect
Question 49 of 50
49. Question
1 point(s)
64-bit Block Size, 56-bit Key size, & 16 number of rounds are the parameters of
Correct
Incorrect
Question 50 of 50
50. Question
1 point(s)
Digital Certificate’s “Subject” field shows
Correct
Incorrect
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.