0 of 50 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Current
Review
Answered
Correct
Incorrect
Question 1 of 50
1 point(s)
Vulnerability Database launched by NIST is:
Question 2 of 50
1 point(s)
Which of the followings is not a Vulnerability Scanning tool?
Question 3 of 50
1 point(s)
Which of the followings is not an example of Non-Electronic / Non-Technical Password Attacks?
Question 4 of 50
1 point(s)
Bob is cracking a password by using the list of known and common phrases until the password is accepted. Which type of attack is this?
Question 5 of 50
1 point(s)
An attacker is cracking the password by trying every possible combination of alpha-numeric characters. Which of the following types of Password Cracking is this?
Question 6 of 50
1 point(s)
Addition of characters in the password to make it one-way function is called:
Question 7 of 50
1 point(s)
Which of the following is a framework that can perform automated attacks on services, applications, port & unpatched software?
Question 8 of 50
1 point(s)
Cracking password with pre-computed hashes is called:
Question 9 of 50
1 point(s)
How can you mitigate Rainbow table attack?
Question 10 of 50
1 point(s)
Which of the following statements is the appropriate definition of malware?
Question 11 of 50
1 point(s)
Which of the followings does not belong to the virus?
Question 12 of 50
1 point(s)
Malware Static Analysis is:
Question 13 of 50
1 point(s)
Malware Dynamic Analysis is:
Question 14 of 50
1 point(s)
Which of the followings does not belongs to Trojan deployment?
Question 15 of 50
1 point(s)
_____________ is used to hide malicious program while creating Trojan.
Question 16 of 50
1 point(s)
____________ is used to bind malicious program while creating Trojan.
Question 17 of 50
1 point(s)
____________ is used to drop malicious program at the
Question 18 of 50
1 point(s)
Sniffing is performed over:
Question 19 of 50
1 point(s)
Sniffing without interfering is known as:
Question 20 of 50
1 point(s)
The port, which allows you to send a copy of packet over another port at layer 2 is called:
Question 21 of 50
1 point(s)
Wiretapping with legal authorization is called:
Question 22 of 50
1 point(s)
Which one of the followings is the best option to defend against ARP poisoning?
Question 23 of 50
1 point(s)
Which of the following Wireshark filters display packet from 10.0.0.1?
Question 24 of 50
1 point(s)
A phishing attack is performed over:
Question 25 of 50
1 point(s)
Basic Purpose of Social Engineering attacks are:
Question 26 of 50
1 point(s)
Which of the followings is not a type of Human-based Social Engineering?
Question 27 of 50
1 point(s)
Attack performed by a disgruntled employee of an organization is called:
Question 28 of 50
1 point(s)
To defend against a phishing attack, a necessary step is:
Question 29 of 50
1 point(s)
The technique of passing the restricted area by an unauthorized person with an authorized person is called:
Question 30 of 50
1 point(s)
The technique of passing the restricted area by an unauthorized person by following an authorized person is called:
Question 31 of 50
1 point(s)
When an attack denies the services and resources, and become unavailable for legitimate users, it is known as:
Question 32 of 50
1 point(s)
DoS attack in which flooding of the request overloads web application or web server is known as:
Question 33 of 50
1 point(s)
DoS Attack focused on hardware sabotage is known as:
Question 34 of 50
1 point(s)
DoS attack in which Intermediary and Secondary victims are also involved in the process of launching a DoS attack is known as:
Question 35 of 50
1 point(s)
Scanning technique with a list of potentially vulnerable machines is known as:
Question 36 of 50
1 point(s)
Scanning any IP address from IP address Space for vulnerabilities is called:
Question 37 of 50
1 point(s)
When an attacker directly exploits and copies the malicious code to the victim’s machine, this propagation is called:
Question 38 of 50
1 point(s)
When an attacker exploits the vulnerable system, and opens a connection to transfer malicious code, this propagation is called:
Question 39 of 50
1 point(s)
An automated process of detecting DoS/DDoS attacks by analysis of input signals is called:
Question 40 of 50
1 point(s)
Sequential Change-Point detection algorithm uses the ________________ technique to detect DoS/DDoS attack.
Question 41 of 50
1 point(s)
_______________ Filtering Standard is designed for Ingress filtering for multi-homed networks to limit the DDoS attacks.
Question 42 of 50
1 point(s)
The process of silently dropping the traffic (either incoming or outgoing traffic), so that the source is not notified about the discarding of the packet, is known as:
Question 43 of 50
1 point(s)
Which statement defines session hijacking more accurately?
Question 44 of 50
1 point(s)
Which of the followings do not belong to session hijacking attack?
Question 45 of 50
1 point(s)
In session hijacking, a technique is used to send packets via specific route, e., identical to victim’s path, this technique is known as:
Question 46 of 50
1 point(s)
Session Fixation is vulnerable to _______________.
Question 47 of 50
1 point(s)
HIDS is deployed to monitor activities on the _____________.
Question 48 of 50
1 point(s)
A computer system is placed in between public and private network, certain roles and responsibilities are assigned to this computer to perform. This System is known as:
Question 49 of 50
1 point(s)
Cisco ASA with FirePOWER Services is an example of:
Question 50 of 50
1 point(s)
The devices or system that are deployed to trap attackers attempting to gain unauthorized access to the system or network as they are deployed in an isolated environment and being monitored are known as: