START QUIZ
#1. In computer security, _________ means that computer system assets can be modified only by authorized parities.
next
#2. In computer security, ___________means that the information in a computer system only is accessible for reading by authorized parities.
next
#3. The type of threats on the security of a computer system or network are _________
i) Interruption
ii) Interception
iii) Modification
iv) Creation
v) Fabrication
next
#4. Which of the following is an independent malicious program that need not any host program?
next
#5. The ……………………is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely a sequence of events.
next
#6. The …………….. is a code embedded in some legitimate program that is set to “explode” when certain conditions are met.
next
#7. Which of the following malicious program do not replicate automatically?
next
#8. __________ programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly.
next
#9. State whether true or false.
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
next
#10. A ___________ is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.
next
#11. ____________ are used in denial of service attacks, typically against targeted websites.
next
#12. Select the correct order for the different phases of virus execution.
i) Propagation phase
ii) Dormant phase
iii) Execution phase
iv) Triggering phase
next
#13. A __________________attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.
next
#14. _____________Is a form of virus explicitly designed to hide from detection by antivirus software.
next
#15. _____________Is a form of virus explicitly designed to hide from detection by antivirus software.
next
#16. A ____________ Creates copies during replication that are functionally equivalent but have distinctly different bit patterns.
next
#17. A portion of the Polymorphic virus, generally called a ___________ creates, a random encryption, key to encrypt the remainder of the virus.
next
#18. State whether the following statement is true.
i) A macro virus is platform independent.
ii) Macro viruses infect documents, not executable portions of code.
next
#19. The type(s) of auto-executing macros, in Microsoft word, is/are __________.
next
#20. In ____________ the virus places an identical copy of itself into other programs or into certain system areas on the disk.
next
#21. A _________ is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks.
next
#22. Which of the following are the solutions to network security?
i) Encryption
ii) Authentication
iii) Authorization
iv) Non-repudiation
next
#23. __________ is to protect data and passwords.
next
#24. The following protocols and systems are commonly used to provide various degrees of security services in a computer networks.
i) IP filtering
ii)Reverse Address Translation
iii) IP security Architecture (IPsec)
iv) Firewalls
v) Socks
next
#25. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as____________.
next
#26. Which of the following is / are the types of firewall?
next
#27. The components of IP security includes _____________.
next
#28. ______________ Is used to carry traffic of one protocol over a network that does not support that protocol directly.
next
#29. In _____________ Mode, the authentication header is inserted immediately after the IP header.
next
#30. State true or false.
i) Socks are a standard for circuit-level gateways.
ii) The NAT is used for a small number of the hosts in a
next
#31. A ____________ is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.
next
#32. The primary goal of the __________ protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity.
next
#33. The ___________ is used to provide integrity check, authentication and encryption to IP datagram.
next
#34. In ___________mode, a common technique in packet-switched networks consists of wrapping a packet in a new one.
next
#35. The ___________Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level.
next
#36. At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the_____________.
next
#37. While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part ____________To the SSL code on the server.
next
#38. On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys called the ____________.
next
#39. State whether the following statement is true.
i) An application-level gateway is often referred to as a proxy.
ii) In proxy, a direct connection is established between the client and the destination server.
next
#40. In the packet-filtering router, the following information can be external from the packet header.
i) Source IP address
ii) Destination IP address
iii) TCP/UDP source port
iv) ICMP message type
v) TCP/UDP destination port
next
#41. ___________ Mode is used whenever either end of a security association is the gateway.
next
#42. Why would a hacker use a proxy server?
next
#43. What type of symmetric key algorithm using a streaming cipher to encrypt information?
next
#44. Which of the following is not a factor in securing the environment against an attack on security?
next
#45. What type of attack uses a fraudulent server with a relay address?
next
#46. What port is used to connect to the Active Directory in Windows 2000?
next
#47. To hide information inside a picture, what technology is used?
next
#48. Which phase of hacking performs an actual attack on a network or system?
next
#49. Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.
next
#50. Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?
next
#51. Which of the following is not a typical characteristic of an ethical hacker?
next
#52. What is the proper command to perform a Nmap XMAS scan every 15seconds?
next
#53. What type of rootkit will patch, hook, or replace the version of system call in order to hide information?
next
#54. What is the purpose of a Denial of Service attack?
next
#55. What are some of the most common vulnerabilities that exist in a network or system?
next
#56. What is the sequence of a TCP connection?
next
#57. What tool can be used to perform SNMP enumeration?
next
#58. Which ports should be blocked to prevent null session enumeration?
next
#59. The first phase of hacking an IT system is compromise of which foundation of security?
next
#60. How is IP address spoofing detected?
next
#61. Why would a ping sweep be used?
next
#62. What are the port states determined by Nmap?
next
#63. What port does Telnet use?
next
#64. Which of the following will allow footprinting to be conducted without detection?
next
#65. Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________.
finish