Only a cyber security expert can handle these questions?
Only a cyber security expert can handle these questions
Author : Adiyogi Quiz Master
Posted On : 03-Mar-2018
Q1: What type of symmetric key algorithm using a streaming cipher to encrypt information?
- A. RC4
- B. Blowfish
- C. SHA
- D. MD5
Q2: What type of attack uses a fraudulent server with a relay address?
- A. NTLM
- B. MITM
- C. NetBIOS
- D. SMB
Q3: To hide information inside a picture, what technology is used?
- A. Rootkits
- B. Bitmapping
- C. Steganography
- D. Image Rendering
Q4: Which phase of hacking performs actual attack on a network or system?
- A. Reconnaissance
- B. Maintaining Access
- C. Scanning
- D. Gaining Access
Q5: Attempting to gain access to a network using an employee?s credentials is called the _____________ mode of ethical hacking.
- A. Local networking
- B. Social engineering
- C. Physical entry
- D. Remote networking
Q6: What type of rootkit will patch, hook, or replace the version of system call in order to hide information?
- A. Library level
- B. Kernel level
- C. System level
- D. Application level
Q7: What tool can be used to perform SNMP enumeration?
- A. DNSlookup
- B. Whois
- C. Nslookup
- D. IP Network Browser
Q8: Which ports should be blocked to prevent null session enumeration?
- A. Ports 120 and 445
- B. Ports 135 and 136
- C. Ports 110 and 137
- D. Ports 135 and 139
Q9: What are the port states determined by Nmap?
- A. Active, inactive, standby
- B. Open, half-open, closed
- C. Open, filtered, unfiltered
- D. Active, closed, unused
Q10: What port does Telnet use?
- A. 22
- B. 80
- C. 20
- D. 23
post a comment