0 of 50 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Current
Review
Answered
Correct
Incorrect
Question 1 of 50
1 point(s)
Which of the following is not appropriate for IDS evasion?
Question 2 of 50
1 point(s)
Sending Split packet out-of-order with delay is an example of
Question 3 of 50
1 point(s)
Which of the following is not a type of Open Source Web Server architecture?
Question 4 of 50
1 point(s)
An attacker is attempting trial and error method to access restricted directories using
dots and slash sequences. Which type of Web server attack is this?
Question 5 of 50
1 point(s)
An attacker sends a request which allows him to add header response; now he
redirects the user to a malicious website. Which type of attack is this?
Question 6 of 50
1 point(s)
Update that is specially designed to fix the issue for a live production environment is
called
Question 7 of 50
1 point(s)
A piece of Software developed to fix an issue
Question 8 of 50
1 point(s)
Which of the following is Patch Management tool?
Question 9 of 50
1 point(s)
Individual who is responsible for the management and configuration required for the
web application is called
Question 10 of 50
1 point(s)
Which of the Following is not a Back-end Programming language?
Question 11 of 50
1 point(s)
Which of the Following is not a Front-end Programming language?
Question 12 of 50
1 point(s)
Web Applications working is categorized into the following three basic layers:
Question 13 of 50
1 point(s)
An attacker has accessed the web application. Now, he is escalating privileges to
access sensitive information. Which type of web application attack is this?
Question 14 of 50
1 point(s)
Which of the following is not appropriate for Data Connectivity attack between
application and its database?
Question 15 of 50
1 point(s)
Inferential Injection is also called as
Question 16 of 50
1 point(s)
An attack is using same communication channel to launch the injection attack and
gather information from the response. Which type of SQL injection is being
performed?
Question 17 of 50
1 point(s)
Which SQL statement is used to extract data from a database?
Question 18 of 50
1 point(s)
Which SQL statement is used to update data in a database?
Question 19 of 50
1 point(s)
What does SQL stand for?
Question 20 of 50
1 point(s)
Name of Access Point that is usually broadcasting for the identification of wireless
network is called
Question 21 of 50
1 point(s)
In a Wi-Fi Network with Open Authentication, how many frames are communicated
between client and AP to complete authentication process?
Question 22 of 50
1 point(s)
In a Wi-Fi Network with Shared Key Authentication, how many frames are
communicated between client and AP to complete authentication process?
Question 23 of 50
1 point(s)
Wi-Fi authentication with centralized authentication server deployed using
Question 24 of 50
1 point(s)
Doughnut Shaped Radiation pattern is obtained from
Question 25 of 50
1 point(s)
Which Wireless encryption uses 24-bit Initialization Vector to create RC4 with CRC?
Question 26 of 50
1 point(s)
Which of the following protocol ensures per packet key by dynamically generating a
128-bit key?
Question 27 of 50
1 point(s)
In Bluetooth network, target devices are overflowed by random packets. Which type of
Bluetooth attack is this?
Question 28 of 50
1 point(s)
The attacker is attempting to gain remote access to a Bluetooth device to compromise
its security, which type of attack is this?
Question 29 of 50
1 point(s)
Which of the following tool is appropriate for packet sniffing in a wireless network?
Question 30 of 50
1 point(s)
Which device can detect rogue wireless access point?
Question 31 of 50
1 point(s)
Jailbreaking refers to:
Question 32 of 50
1 point(s)
When an iOS device is rebooted, it will no longer have a patched kernel, may stick in a
partially started state. Which type of Jailbreaking is performed on it?
Question 33 of 50
1 point(s)
Official Application store for Blackberry platform is
Question 34 of 50
1 point(s)
Which is the most appropriate solution if an administrator is requires monitoring and
control over mobile devices running on a corporate network?
Question 35 of 50
1 point(s)
How many layers are there in an architecture of IoT?
Question 36 of 50
1 point(s)
Which layer in IoT architecture is responsible for device and information
management?
Question 37 of 50
1 point(s)
Which SQL Query is correct to extract only “UserID” field from the “Employees” table in the database?
Question 38 of 50
1 point(s)
Which layer is responsible for Protocol translation and messaging?
Question 39 of 50
1 point(s)
IoT device directly communicating with the application server is:
Question 40 of 50
1 point(s)
An eavesdropper records the transmission and replays it at a later time to cause the
receiver to ‘unlock’, this attack is known as:
Question 41 of 50
1 point(s)
IaaS Cloud Computing Service offers
Question 42 of 50
1 point(s)
Following is an example of SaaS
Question 43 of 50
1 point(s)
Cloud deployment model accessed by multiple parties having shared resources is a:
Question 44 of 50
1 point(s)
A person or organization that maintains a business relationship with, and uses service
from Cloud Providers is known as
Question 45 of 50
1 point(s)
A person who negotiates the relationship between Cloud Provider & Consumer is
called
Question 46 of 50
1 point(s)
Symmetric Key Cryptography requires
Question 47 of 50
1 point(s)
AES & DES are the examples of
Question 48 of 50
1 point(s)
The cipher that encrypts the plain text one by one is known as
Question 49 of 50
1 point(s)
64-bit Block Size, 56-bit Key size, & 16 number of rounds are the parameters of
Question 50 of 50
1 point(s)
Digital Certificate’s “Subject” field shows