0 of 50 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Current
Review
Answered
Correct
Incorrect
Question 1 of 50
1 point(s)
These hackers have limited or no training and they only know how to use basic methods or What kind of hackers are we talking about?
Question 2 of 50
1 point(s)
What is considered to be a brute force attack?
Question 3 of 50
1 point(s)
Which of the followings is one of the most actual way to prevent Cross-site Scripting (XSS) in software applications?
Question 4 of 50
1 point(s)
A hacker has successfully infected an internet-facing server to send junk mails. Which sort of Trojan infects this server?
Question 5 of 50
1 point(s)
In which phase of the ethical hacking process, Google hacking is employed?
Question 6 of 50
1 point(s)
Which of the followings are well known password-cracking programs?
Question 7 of 50
1 point(s)
Select the program which infects the system boot sector and the executable files at the same time:
Question 8 of 50
1 point(s)
While testing the company’s web applications, a tester attempts to insert the following test script into the search area on the company’s website:
<script >alert (“Testing Testing Testing”) </script >
Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text: “Testing Testing Testing”. Which of the following vulnerability has been detected in the web application?
Question 9 of 50
1 point(s)
A pentester is configuring a Windows laptop for a test. While setting Wireshark, which of the following driver and library are required to allow the NIC to work in promiscuous mode?
Question 10 of 50
1 point(s)
While scanning your company’s network, you discover that TCP port 123 is open. Which of the services by default run on TCP port 123?
Question 11 of 50
1 point(s)
Which of the following techniques will identify if the computer files have been changed?
Question 12 of 50
1 point(s)
Which of the following tools would be used to collect Wireless Packet Data?
Question 13 of 50
1 point(s)
A log monitoring tool alerted several suspicious logins on a Linux server during non-business hours while performing behavioural analysis. After further examination of all login activities, it was noticed that one of the logins have occurred during typical working hours. A Linux administrator who is investigating this problem comes to know that the system time on the Linux server is wrong by more than twelve hours. Which type of protocol must be used on Linux server to synchronize the time that has stopped working?
Question 14 of 50
1 point(s)
Which of the following Intrusion Detection System is best applicable for large environments, where critical assets on the network need extra security and is ideal for observing sensitive network segments?
Question 15 of 50
1 point(s)
Which tool is used to silently copy files from USB devices?
Question 16 of 50
1 point(s)
Define Denial-of-Service attack?
Question 17 of 50
1 point(s)
Fingerprint and Smartcard ID are the examples of two factor authentication.Which of the followings is an example of two factor authentication?
Question 18 of 50
1 point(s)
What is the best way to defend against network sniffing?
Question 19 of 50
1 point(s)
An NMAP scan of a server shows that port 69 is open. What risk could this pose?
Question 20 of 50
1 point(s)
Which of the following components of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
Question 21 of 50
1 point(s)
Which of the following modes of IPSec should you use to assure security and confidentiality of data within the same LAN?
Question 22 of 50
1 point(s)
Differentiate between the AES and RSA algorithms?
Question 23 of 50
1 point(s)
Which port number is used by LDAP protocol?
Question 24 of 50
1 point(s)
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?
Question 25 of 50
1 point(s)
A Virus that attempts to install itself inside the file that it is infecting, is called:
Question 26 of 50
1 point(s)
Which kind of security feature stops vehicles from crashing through the doors of a building?
Question 27 of 50
1 point(s)
Which of the following programs are usually targeted at Microsoft Office products?
Question 28 of 50
1 point(s)
Two-factor authentication deals with:
Question 29 of 50
1 point(s)
During a security audit of IT process, an IS auditor found that there were no documented security procedures. What should the IS auditor do?
Question 30 of 50
1 point(s)
________ is a tool that can hide processes from the process list, hide files, intercept keystrokes, and register entries.
Question 31 of 50
1 point(s)
_____________ is an extremely common IDS evasion system in the web world.
Question 32 of 50
1 point(s)
The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the Central Processing Unit (CPU), rather than passing only the frames that the controller is intended to receive. Which of the following terms is being described?
Question 33 of 50
1 point(s)
Which of the following types of scan is used on the eye to measure the layer of blood vessels?
Question 34 of 50
1 point(s)
Define a “collision attack” in cryptography?
Question 35 of 50
1 point(s)
What is a short-range wireless communication technology intended to replace the cables connecting portable of fixed devices, while maintaining high levels of security allows mobile phones, computer and other devices to connect and communicate using a short-range wireless connection. Select the best match from the followings:
Question 36 of 50
1 point(s)
What is the most important stage of ethical hacking in which you need to spend a considerable amount of time?
Question 37 of 50
1 point(s)
An e-commerce site was put into a live environment and the programmers failed to remove the secret entry point that was used during the application development. The secret entry point is known as _______?
Question 38 of 50
1 point(s)
Which of the following is considered as a strength of symmetric key cryptography, when compared with asymmetric algorithms?
Question 39 of 50
1 point(s)
A medium-sized healthcare IT business decides to implement a risk management strategy. There are five basic responses to risk except______.
Question 40 of 50
1 point(s)
Which of the followings provides most information about the system’s security posture?
Question 41 of 50
1 point(s)
Which of the following steps for risk assessment methodology refers to vulnerability identification?
Question 42 of 50
1 point(s)
Which of the followings is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
Question 43 of 50
1 point(s)
What should you do next when perspective clients want to see sample reports from previous penetration tests?
Question 44 of 50
1 point(s)
Which TCP flag instructs the sending system to transmit all buffered data immediately?
Question 45 of 50
1 point(s)
The “black box testing ” methodology enforces which kind of restriction?
Question 46 of 50
1 point(s)
Which of these options is the most secure method for storing backup tapes?
Question 47 of 50
1 point(s)
A hacker is attempting to use nslookup to query Domain Name Service (DNS). The hacker uses the nslookup interactive mode for a search. Which command should the hacker type into the command shell to request the appropriate records?
Question 48 of 50
1 point(s)
___________ processes evaluate the adherence of an organization to its stated security policy.
Question 49 of 50
1 point(s)
What is the best countermeasure to encrypting ransomwares?
Question 50 of 50
1 point(s)
You have effectively compromised a machine on the network and found a server that is alive on the same network. You tried to ping it but you did not get any response back. What is the cause of this?