0 of 155 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 155 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
Current
Review
Answered
Correct
Incorrect
Question 1 of 155
1 point(s)
Which of the following does an ethical hacker require to penetrate a system?
Question 2 of 155
1 point(s)
What is Gray box Pentesting?
Question 3 of 155
1 point(s)
If you have been hired to perform an attack against a target system to find and exploit
vulnerabilities, what type of hacker you are?
Question 4 of 155
1 point(s)
Which of the following describes an attacker who goes after a target to draw attention
to a cause?
Question 5 of 155
1 point(s)
What is the level of knowledge does a script kiddie have?
Question 6 of 155
1 point(s)
A white-box test requires?
Question 7 of 155
1 point(s)
Which of the following describes a hacker who attacks without regard for being
caught or punished?
Question 8 of 155
1 point(s)
A penetration test is required for which of the following reason?
Question 9 of 155
1 point(s)
Hacker using their skills for both benign and malicious goals at different times are?
Question 10 of 155
1 point(s)
Vulnerability analysis is basically:
Question 11 of 155
1 point(s)
What is Black-box testing?
Question 12 of 155
1 point(s)
What does TOE stand for?
Question 13 of 155
1 point(s)
The term Vulnerability refers to:
Question 14 of 155
1 point(s)
What are the basic ways to perform footprinting?
Question 15 of 155
1 point(s)
Which one of the following the best meaning of Footprinting?
Question 16 of 155
1 point(s)
What is the purpose of Social Engineering?
Question 17 of 155
1 point(s)
Which feature is used to make search more appropriate?
Question 18 of 155
1 point(s)
Wayback Machine is used for
Question 19 of 155
1 point(s)
Manage a Website
Question 20 of 155
1 point(s)
Which record type will reveal the information about Host IP address.
Question 21 of 155
1 point(s)
Which record type will reveal the information about Domain’s Mail Server (MX)
Question 22 of 155
1 point(s)
Following is the most popular Web Reconnaissance framework used for information
gathering purpose as well as network detection.
Question 23 of 155
1 point(s)
Which tool can be used to view web server information?
Question 24 of 155
1 point(s)
To extract information regarding domain name registration, which of the following is
most appropriate?
Question 25 of 155
1 point(s)
Which of the following statement below is correct?
Question 26 of 155
1 point(s)
Is three-way handshaking the process of?
Question 27 of 155
1 point(s)
Which of the following tool is used for Banner grabbing?
Question 28 of 155
1 point(s)
SNMPv3 supports
Question 29 of 155
1 point(s)
Which server anonymizes the web traffic to provide anonymity.
Question 30 of 155
1 point(s)
Which of the following tool is capable of performing a customized scan?
Question 31 of 155
1 point(s)
Which of the following is not a TCP Flag?
Question 32 of 155
1 point(s)
Successful three-way handshaking is consisting of
Question 33 of 155
1 point(s)
Method of pinging a range of IP address is called as:
Question 34 of 155
1 point(s)
Scanning technique in which TCP Three-way handshaking session is initiated and
completed is called:
Question 35 of 155
1 point(s)
Xmas Scan is a type of Inverse TCP Flag scanning in which:
Question 36 of 155
1 point(s)
What is true about Enumeration:
Question 37 of 155
1 point(s)
NetBIOS is basically
Question 38 of 155
1 point(s)
Which port does not belong to NetBIOS over TCP (NetBT):
Question 39 of 155
1 point(s)
Which of the following does not belong to NetBIOS Enumeration?
Question 40 of 155
1 point(s)
The command nbstat with the option “-a” extract the information of:
Question 41 of 155
1 point(s)
The command nbstat with the option “-A” extract the information of:
Question 42 of 155
1 point(s)
Following is not an example of SNMP Manager software
Question 43 of 155
1 point(s)
Which of the following is correct about SNMP?
Question 44 of 155
1 point(s)
Which of the following statement is true about NTP authentication?
Question 45 of 155
1 point(s)
The process of finding weaknesses, design flaws and security concerns in a network,
operating system, applications or website is called
Question 46 of 155
1 point(s)
Which of the following is a Pre-Assessment phase of Vulnerability Assessment Life-
Cycle?
Question 47 of 155
1 point(s)
Vulnerability Post Assessment phase includes
Question 48 of 155
1 point(s)
Vulnerability assessment process in which auditor follows different strategies for each
network component is called:
Question 49 of 155
1 point(s)
Approach to assist depending on the inventory of protocols in an environment is
called
Question 50 of 155
1 point(s)
CVSS Stands for
Question 51 of 155
1 point(s)
Vulnerability Database launched by NIST is:
Question 52 of 155
1 point(s)
Which of the following is not a Vulnerability Scanning tool?
Question 53 of 155
1 point(s)
Which of the following is not an example of Non-Electronic / Non-Technical Password
Attacks?
Question 54 of 155
1 point(s)
Bob is cracking a password using the list of known and common phrases until the
password is accepted. Which type of attack is this?
Question 55 of 155
1 point(s)
An attacker is cracking the password by trying every possible combination of alpha-
numeric characters, which of the following type of Password Cracking is this?
Question 56 of 155
1 point(s)
Addition of characters in the password to make it one-way function is called
Question 57 of 155
1 point(s)
Which of the following statement is the appropriate definition of malware?
Question 58 of 155
1 point(s)
Which of the following is a framework that can perform automated attacks on
services, applications, port & unpatched software?
Question 59 of 155
1 point(s)
Cracking password with precomputed hashes is
Question 60 of 155
1 point(s)
How can you mitigate Rainbow table attack?
Question 61 of 155
1 point(s)
Which of the following does not belongs to the virus?
Question 62 of 155
1 point(s)
Malware Static Analysis is
Question 63 of 155
1 point(s)
Malware Dynamic Analysis
Question 64 of 155
1 point(s)
Which of the following does not belongs to Trojan deployment?
Question 65 of 155
1 point(s)
Following is used to hide malicious program while creating Trojan
Question 66 of 155
1 point(s)
Following is used to bind malicious program while creating Trojan
Question 67 of 155
1 point(s)
Following is used to drop malicious program at the target
Question 68 of 155
1 point(s)
Sniffing is performed over
Question 69 of 155
1 point(s)
Sniffing without interfering is known as
Question 70 of 155
1 point(s)
The port which allows you to send a copy of packet over another port at layer 2 is
called
Question 71 of 155
1 point(s)
Wiretapping with legal authorization is called
Question 72 of 155
1 point(s)
Which is the best option to defend against ARP poisoning
Question 73 of 155
1 point(s)
A phishing attack is performed over
Question 74 of 155
1 point(s)
Basic Purpose of Social Engineering attacks are
Question 75 of 155
1 point(s)
Which of the following is not a type of Human-based Social Engineering?
Question 76 of 155
1 point(s)
Attack performed by a disgruntled employee of an organization is called
Question 77 of 155
1 point(s)
To defend against phishing attack, the necessary step is
Question 78 of 155
1 point(s)
The technique of passing restricted area of an unauthorized person with an authorized
person is called
Question 79 of 155
1 point(s)
The technique of passing restricted area of an unauthorized person by following an
authorized person is called
Question 80 of 155
1 point(s)
Which of the following Wireshark filter displays packet from 10.0.0.1?
Question 81 of 155
1 point(s)
An attack, which denied the services, and resources become unavailable for legitimate
users is known as
Question 82 of 155
1 point(s)
DoS attack in which flooding of the request overloads web application or web server is
known as
Question 83 of 155
1 point(s)
DoS Attack focused on hardware sabotage is known as
Question 84 of 155
1 point(s)
DoS attack in which intermediary and Secondary victims are also involved in the
process of launching a DoS attack is known as:
Question 85 of 155
1 point(s)
Scanning technique with a list of potentially vulnerable machines is known as
Question 86 of 155
1 point(s)
Scanning any IP address from IP address Space for vulnerabilities is called
Question 87 of 155
1 point(s)
When an attacker directly exploits and Copy the malicious code to the victim’s
machine, the propagation is:
Question 88 of 155
1 point(s)
When an attacker exploits the vulnerable system, and open a connection to transfer
malicious code, the propagation is called
Question 89 of 155
1 point(s)
An automated process of detecting DoS/DDoS attacks by analysis of input signals is
called
Question 90 of 155
1 point(s)
Sequential Change-Point detection algorithm uses the following technique to detect
DoS/DDoS attack
Question 91 of 155
1 point(s)
Following Filtering Standard is designed for Ingress filtering for multi-homed
networks to limit the DDoS attacks.
Question 92 of 155
1 point(s)
The process of silently dropping the traffic (either incoming or outgoing traffic) so
that the source is not notified about discarding of the packet.
Question 93 of 155
1 point(s)
Which statement defines session hijacking most accurately?
Question 94 of 155
1 point(s)
Which of the following does not belongs to Session hijacking attack?
Question 95 of 155
1 point(s)
In Session hijacking, a technique is used to send packets via specific route, i.e.,
identical to victim’s path, this technique is known as
Question 96 of 155
1 point(s)
Session Fixation is vulnerable to
Question 97 of 155
1 point(s)
HIDS is deployed to monitor activities on the following
Question 98 of 155
1 point(s)
A computer system is placed in between public and private network, certain roles and
responsibilities are assigned to this computer to perform. This System is known as
Question 99 of 155
1 point(s)
Cisco ASA with FirePOWER Services is an example of
Question 100 of 155
1 point(s)
The devices or system that are deployed to trap attackers attempting to gain
unauthorized access to the system or network as they are deployed in an isolated
environment and being monitored are known as
Question 101 of 155
1 point(s)
Which of the following is not appropriate for IDS evasion?
Question 102 of 155
1 point(s)
Sending Split packet out-of-order with delay is an example of
Question 103 of 155
1 point(s)
Which of the following is not a type of Open Source Web Server architecture?
Question 104 of 155
1 point(s)
An attacker is attempting trial and error method to access restricted directories using
dots and slash sequences. Which type of Web server attack is this?
Question 105 of 155
1 point(s)
An attacker sends a request which allows him to add header response; now he
redirects the user to a malicious website. Which type of attack is this?
Question 106 of 155
1 point(s)
Update that is specially designed to fix the issue for a live production environment is
called
Question 107 of 155
1 point(s)
A piece of Software developed to fix an issue
Question 108 of 155
1 point(s)
Which of the following is Patch Management tool?
Question 109 of 155
1 point(s)
Individual who is responsible for the management and configuration required for the
web application is called
Question 110 of 155
1 point(s)
Which of the Following is not a Back-end Programming language?
Question 111 of 155
1 point(s)
Which of the Following is not a Front-end Programming language?
Question 112 of 155
1 point(s)
Web Applications working is categorized into the following three basic layers:
Question 113 of 155
1 point(s)
An attacker has accessed the web application. Now, he is escalating privileges to
access sensitive information. Which type of web application attack is this?
Question 114 of 155
1 point(s)
Which of the following is not appropriate for Data Connectivity attack between
application and its database?
Question 115 of 155
1 point(s)
Inferential Injection is also called as
Question 116 of 155
1 point(s)
An attack is using same communication channel to launch the injection attack and
gather information from the response. Which type of SQL injection is being
performed?
Question 117 of 155
1 point(s)
Which SQL statement is used to extract data from a database?
Question 118 of 155
1 point(s)
Which SQL statement is used to update data in a database?
Question 119 of 155
1 point(s)
What does SQL stand for?
Question 120 of 155
1 point(s)
Name of Access Point that is usually broadcasting for the identification of wireless
network is called
Question 121 of 155
1 point(s)
In a Wi-Fi Network with Open Authentication, how many frames are communicated
between client and AP to complete authentication process?
Question 122 of 155
1 point(s)
In a Wi-Fi Network with Shared Key Authentication, how many frames are
communicated between client and AP to complete authentication process?
Question 123 of 155
1 point(s)
Wi-Fi authentication with centralized authentication server deployed using
Question 124 of 155
1 point(s)
Doughnut Shaped Radiation pattern is obtained from
Question 125 of 155
1 point(s)
Which Wireless encryption uses 24-bit Initialization Vector to create RC4 with CRC?
Question 126 of 155
1 point(s)
Which of the following protocol ensures per packet key by dynamically generating a
128-bit key?
Question 127 of 155
1 point(s)
In Bluetooth network, target devices are overflowed by random packets. Which type of
Bluetooth attack is this?
Question 128 of 155
1 point(s)
The attacker is attempting to gain remote access to a Bluetooth device to compromise
its security, which type of attack is this?
Question 129 of 155
1 point(s)
Which of the following tool is appropriate for packet sniffing in a wireless network?
Question 130 of 155
1 point(s)
Which device can detect rogue wireless access point?
Question 131 of 155
1 point(s)
Jailbreaking refers to:
Question 132 of 155
1 point(s)
When an iOS device is rebooted, it will no longer have a patched kernel, may stick in a
partially started state. Which type of Jailbreaking is performed on it?
Question 133 of 155
1 point(s)
Official Application store for Blackberry platform is
Question 134 of 155
1 point(s)
Which is the most appropriate solution if an administrator is requires monitoring and
control over mobile devices running on a corporate network?
Question 135 of 155
1 point(s)
How many layers are there in an architecture of IoT?
Question 136 of 155
1 point(s)
Which layer in IoT architecture is responsible for device and information
management?
Question 137 of 155
1 point(s)
Which layer is responsible for Protocol translation and messaging?
Question 138 of 155
1 point(s)
Which SQL Query is correct to extract only “UserID” field from the “Employees” table in the database?
Question 139 of 155
1 point(s)
IoT device directly communicating with the application server is:
Question 140 of 155
1 point(s)
An eavesdropper records the transmission and replays it at a later time to cause the
receiver to ‘unlock’, this attack is known as:
Question 141 of 155
1 point(s)
IaaS Cloud Computing Service offers
Question 142 of 155
1 point(s)
Following is an example of SaaS
Question 143 of 155
1 point(s)
Cloud deployment model accessed by multiple parties having shared resources is a:
Question 144 of 155
1 point(s)
A person or organization that maintains a business relationship with, and uses service
from Cloud Providers is known as
Question 145 of 155
1 point(s)
A person who negotiates the relationship between Cloud Provider & Consumer is
called
Question 146 of 155
1 point(s)
Symmetric Key Cryptography requires
Question 147 of 155
1 point(s)
AES & DES are the examples of
Question 148 of 155
1 point(s)
The cipher that encrypts the plain text one by one is known as
Question 149 of 155
1 point(s)
64-bit Block Size, 56-bit Key size, & 16 number of rounds are the parameters of
Question 150 of 155
1 point(s)
Digital Certificate’s “Subject” field shows
Question 151 of 155
1 point(s)
RSA key length varies from
Question 152 of 155
1 point(s)
The message digest is used to ensure
Question 153 of 155
1 point(s)
MD5 produces hash value of
Question 154 of 155
1 point(s)
Cryptographic attack type where a cryptanalyst has access to a ciphertext but does not
have access to the corresponding plaintext is called
Question 155 of 155
1 point(s)
The most secure way to mitigate information theft from a laptop of an organization
left in a public place is