0 of 50 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Current
Review
Answered
Correct
Incorrect
Question 1 of 50
1 point(s)
During the examination of the infected laptop, it is noticed that the malware loads on startup
and also loads a file called netutilities.dll every time MS Word is opened. This is an
example represents which of the following attack?
Question 2 of 50
1 point(s)
While testing a new application your group noted that when 3 or more of you click ‘submit’
at the same time on a particular form, the application crashes every time. This is an example
of which error?
Question 3 of 50
1 point(s)
Which one is a Passive Tool?
Question 4 of 50
1 point(s)
From the following choose the example of Initial Exploitation?
Question 5 of 50
1 point(s)
In which type of testing, the testers are not provided with any type of information for
performing assessment?
Question 6 of 50
1 point(s)
From the following which is not correct regarding insider threat?
Question 7 of 50
1 point(s)
Which of the following can be included in criminal activity on the internet? (Select all that
apply.)
Question 8 of 50
1 point(s)
Which of the following have the ability to write scripts that exploit vulnerabilities and are
also able to discover new vulnerabilities?
Question 9 of 50
1 point(s)
In which of the following threat category the attacks by an attacker or a small group of
attackers falls?
Question 10 of 50
1 point(s)
When the input supplied to the program is more than it can process, what type of
vulnerability occurs?
Question 11 of 50
1 point(s)
A user reports that he is unable to connect to the network. When you troubleshoot the
issue, you notice that the MAC address for his default gateway is not matching with the
MAC address of your company’s router. What type of attack is he facing?
Question 12 of 50
1 point(s)
High traffic load is crashing your e-commerce site. When you look at the traffic logs, you
identify that thousands of requests coming from hundreds of various IP addresses for the
same URL. You are facing which of the following attacks?
Question 13 of 50
1 point(s)
Which of the following can help in cracking the password of a disgruntled user who is fired
recently in the least time?
Question 14 of 50
1 point(s)
The attack in which network traffic is captured and retransmitted at a later time by the
attacker is known as?
Question 15 of 50
1 point(s)
You notice a man in a red shirt standing close to a locked door with a large box in his hands.
He waits for someone else to come along and open the locked door, then proceeds to follow
him inside. What type of social engineering attack is this?
Question 16 of 50
1 point(s)
In your company, the desktops are being infected by a malware in a way that more and
more systems are becoming a victim of that malware every hour despite the fact that users
are not sharing any e-mails, programs, or even files. Which malware is causing this
infection?
Question 17 of 50
1 point(s)
You are not able to open any of the Word document stored on the local system and when
a document is forced open for analyzation purpose you see only random characters and
there is no sign that the file is still a Word document. You are a victim of which malware?
Question 18 of 50
1 point(s)
Some desktops in your company are displaying the message “Your files have been
encrypted. Pay 2 bitcoins in order to recover them.” These desktops have been affected by
which malware?
Question 19 of 50
1 point(s)
A member of your company is facing issues with his laptop. Whenever he opens a browser,
he sees various pop-ups after every few minutes and whatever website he visits, the popups
appear. His laptop is affected by which malware?
Question 20 of 50
1 point(s)
For what reason NAT will likely keep on being used in even IPv6 systems?
Why will NAT likely continue to be used even in IPv6 networks?
Question 21 of 50
1 point(s)
You are requested to suggest a VPN methodology to a senior management of your company
for newly purchased VPN concentrators. For what reason would you
firmly recommend IPSec VPNs?
Question 22 of 50
1 point(s)
Which of the following is the core technology of NIPS on which it relies?
Question 23 of 50
1 point(s)
How can security be improved through a proxy server?
Question 24 of 50
1 point(s)
For encryption keys, the temper protection can be provided by which of the following
device?
Question 25 of 50
1 point(s)
From the following which one represents most network tools that detect an attack?
Question 26 of 50
1 point(s)
The tcpdump command-line tool is a category of which of the following?
Question 27 of 50
1 point(s)
A company was attacked by the bad guys multiple times and that attack results in data
violations. Therefore the company set up some vulnerable virtual machines containing fake
data that looks exactly like the company’s real machines in order to identify how the bad
guys get into the system. Which of the following mechanism was implemented by the
company?
Question 28 of 50
1 point(s)
If a worm is going through your company that reaches out to other nodes on port TCP/1337.
Which of the following tools would you need to identify the affected nodes on your
network?
Question 29 of 50
1 point(s)
Related to log and event anomalies which principle is valid?
Question 30 of 50
1 point(s)
The most likely reason behind access violation errors is?
Question 31 of 50
1 point(s)
Which statement is true regarding firewalls?
Question 32 of 50
1 point(s)
Satellite communications (SATCOM) usage is most common in which of the following
scenario?
Question 33 of 50
1 point(s)
For establishing trust relationship which mechanism is used by the Bluetooth?
Question 34 of 50
1 point(s)
From the following which one is not a part of a proper Mobile Device Management (MDM)
policy?
Question 35 of 50
1 point(s)
ANT is correctly described by which of the following?
Question 36 of 50
1 point(s)
A user is receiving “cannot resolve address” error notes from his browser. Which port is
possibly an issue on his firewall?
Question 37 of 50
1 point(s)
Which of the following defines the Secure Shell (SSH) protocol?
Question 38 of 50
1 point(s)
Which port is used by FTPS?
Question 39 of 50
1 point(s)
Which of the following statement regarding Transport Layer Security (TLS) is correct?
Question 40 of 50
1 point(s)
Which of the following is the purpose of using Tunneling?
Question 41 of 50
1 point(s)
The defense-in-depth is not supported by which one of the following?
Question 42 of 50
1 point(s)
Which of the following can result in the highest risk if configured improperly?
Question 43 of 50
1 point(s)
Why is UEFI preferred rather than BIOS?
Question 44 of 50
1 point(s)
Which of the following is not performed by a Secure Boot?
Question 45 of 50
1 point(s)
What is not true about hardware roots of trust?
Question 46 of 50
1 point(s)
What is the simple way of improving the security of a system?
Question 47 of 50
1 point(s)
Which statement is not true regarding systems on a chip?
Question 48 of 50
1 point(s)
Which aspect is important to remember while dealing with the medical device’s security?
Question 49 of 50
1 point(s)
Which term describes the loss of control over data during operations?
Question 50 of 50
1 point(s)
In which testing environment fuzz testing works great?