0 of 50 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Current
Review
Answered
Correct
Incorrect
Question 1 of 50
1 point(s)
Which of the followings is not appropriate for IDS evasion?
Question 2 of 50
1 point(s)
Sending Split packet out-of-order with delay is an example of:
Question 3 of 50
1 point(s)
Which of the followings is not a type of Open Source Web Server architecture?
Question 4 of 50
1 point(s)
An attacker is attempting trial and error method to access restricted directories using dots and slash sequences. Which type of Web server attack is this?
Question 5 of 50
1 point(s)
An attacker sends a request, which allows him to add header response; now he redirects the user to a malicious Which type of attack is this?
Question 6 of 50
1 point(s)
An update that is specially designed to fix the issue for a live production environment is called:
Question 7 of 50
1 point(s)
A piece of Software developed to fix an issue is called:
Question 8 of 50
1 point(s)
Which of the following is the Patch Management tool?
Mic
Question 9 of 50
1 point(s)
An individual who is responsible for the management and configuration required for the web application is called:
Question 10 of 50
1 point(s)
Which of the Followings is not a Back-end Programming language?
Question 11 of 50
1 point(s)
Which of the Followings is not a Front-end Programming language?
Question 12 of 50
1 point(s)
Web Applications architecture is categorized into three basic layers, which are?
Question 13 of 50
1 point(s)
An attacker has accessed the web application. Now, he is escalating privileges to access sensitive information. Which type of web application attack is this?
Question 14 of 50
1 point(s)
Which of the followings is not appropriate for Data Connectivity attack between application and its database?
Question 15 of 50
1 point(s)
Inferential Injection is also called:
Question 16 of 50
1 point(s)
An attacker is using the same communication channel to launch the injection attack and gather information from the response. Which type of SQL injection is being performed?
Question 17 of 50
1 point(s)
Which SQL statement is used to extract data from a database?
Question 18 of 50
1 point(s)
Which SQL statement is used to update data in a database?
Question 19 of 50
1 point(s)
Which SQL Query is correct to extract only “UserID” field from the “Employees” table in the database?
Question 20 of 50
1 point(s)
What does SQL stand for?
Question 21 of 50
1 point(s)
Name of Access Point that is usually broadcasting for the identification of wireless network is called:
Question 22 of 50
1 point(s)
In a Wi-Fi Network with Open Authentication, how many frames are communicated between client and AP to complete authentication process?
Question 23 of 50
1 point(s)
In a Wi-Fi Network with Shared Key Authentication, how many frames are communicated between client and AP to complete authentication process?
Question 24 of 50
1 point(s)
Wi-Fi authentication with centralized authentication server is deployed by using __________.
Question 25 of 50
1 point(s)
Doughnut Shaped Radiation pattern is obtained from _______________.
Question 26 of 50
1 point(s)
Which Wireless encryption uses 24-bit Initialization Vector to create RC4 with CRC?
Question 27 of 50
1 point(s)
Which of the following protocols ensures per packet key by dynamically generating a 128-bit key?
Question 28 of 50
1 point(s)
In Bluetooth network, target devices are being overflowed by random packets. Which type of Bluetooth attack is this?
Question 29 of 50
1 point(s)
Which of the following tools is appropriate for packet sniffing in a wireless network?
Question 30 of 50
1 point(s)
An attacker is attempting to gain remote access to a Bluetooth device to compromise its security. Which type of attack is this?
Question 31 of 50
1 point(s)
Which device can detect rogue wireless access point?
Question 32 of 50
1 point(s)
Jailbreaking refers to:
Question 33 of 50
1 point(s)
When an iOS device is rebooted, it will no longer have a patched kernel and may stick in a partially started state. Which type of Jailbreaking is performed on it?
Question 34 of 50
1 point(s)
Official Application store for Blackberry platform is ____________:
Question 35 of 50
1 point(s)
How many layers are there in an architecture of IoT?
Question 36 of 50
1 point(s)
If an administrator is required to monitor and control over mobile devices running on a corporate network, then which one of the followings is the most appropriate solution?
Question 37 of 50
1 point(s)
Which layer in IoT architecture is responsible for device and information management?
Question 38 of 50
1 point(s)
Which layer is responsible for Protocol translation and messaging?
Question 39 of 50
1 point(s)
An IoT device directly communicating with the application server is called:
Question 40 of 50
1 point(s)
An eavesdropper records the transmission and replays it at a later time to cause the receiver to ‘unlock’, this attack is known as:
Question 41 of 50
1 point(s)
IaaS Cloud Computing Service offers ______________.
Question 42 of 50
1 point(s)
Following is an example of SaaS
Question 43 of 50
1 point(s)
Cloud deployment model accessed by multiple parties having shared resources is a:
Question 44 of 50
1 point(s)
A person or organization that maintains a business relationship with, and uses service from Cloud Providers is known as:
Question 45 of 50
1 point(s)
A person who negotiates the relationship between Cloud Provider & Consumer is called:
Question 46 of 50
1 point(s)
Symmetric Key Cryptography requires _______________.
Question 47 of 50
1 point(s)
AES & DES are the examples of _________________.
Question 48 of 50
1 point(s)
The cipher that encrypts the plain text one by one is known as:
Question 49 of 50
1 point(s)
64-bit Block Size, 56-bit Key size, & 16 number of rounds are the parameters of ____________.
Question 50 of 50
1 point(s)
Digital Certificate’s “Subject” field shows ___________________.