Home / Operating System / Question-Jetking-HK4



1) ________ malware is designed to gain administralor-level control over a computer system without getting detected.

a)     Virus

b)     Trojan

c)     Rootkit    D

d)     Spam

2)     ________ is the process by which a sysytem establishes a user’s identity.

a)     Authentication

b)     Authorization       D

c)     Confidentiality

d)     Integrity

3)     _________ is not an example of Biometric Technique.

a)     Fingerprint

b)     Voice pattern

c)     hand measurement      D

d)     Person’s height

4)     _______ amongst the following services are not provided by a firewall?

a)     Packet filtering

b)     Stateful inspection

c)     User authentication      D

d)     Proxy server

5)     Code Red is an example of ________

a)     Worm            D

b)     Trojan

c)     Spyware

d)     Rootkit

6)     ________ would be placed at the terminal-ends of everynetwork segment in most common environments in order to implement perimeter sericuty.

a)     Proxy Servers

b)     Data Servers

c)     Host-based Firewalls     D

d)     Routers

7)     _______ is a powerful tool used for network administration that helps to implement network security policies.

a)     Packet Filtering

b)     Firewall     D

c)     Router

d)     Data Packets

8)     Identify  the metrics followed by packet filtering to allow or deny packets through a firewall.

a)     Sourece IP address of the incoming packet

b)     Destination IP addresses

c)     Type of Internet protocols that the packet may contain

d)     All the above             D

9)     What is the drawback of the packet filtering mechanism?

a)     It is an expensive machanism to implement network perimeter security.           D

b)     It offers speed, but it is tedious to use and requires thorough knowledge.

c)     It doesn’t allow firewall to experiment with application-level data directly.

d)     It secures the application-level data, but doesn’t completely secure the perimeter.

10) which type of packet filtering firewall tracks the state of the network connections and distinguishes legitimate packets for diferent types of connections?

a)     Stateful packet filtering

b)     Stateless packet filtering

11)_________ runs on firewall system between two networks and is connected once the client program establishes the connection to the destination service.

a)     Application Server

b)     Packet Filter Monitoring

c)     Application Gateway             D

d)     Firewall Hardening

12) The two types of firewalls are __________ and _________

a)     Packet Filtering             AB

b)     Proxy

c)     Gateway

d)     Application

13) What is the primary purpose of NAT?

a)     Convert a private IP address that is inside a trusted network to a registered IP address seen by an outside, untrusted network.     D

b)     Monitor incoming and outgoing packets.

c)     Apply spam protection that helps to keep the malicious emails out of your network, such as, viruses and botnets.

d)     Standardise all your wireless connections on WPA protocol

14) __________ offers a method of dividing one physical network i.e.LAN into multiple broadcast domains

a)     LAN

b)     VLAN               D

c)     Gateway

d)     Firewall

15) A tool or software application used to monitor network or system activities to check malicious activitives or policy violations, and produce reports to a Management Station is known as _______.

a)     Intrustion Detection System     D

b)     IP SPoofing

c)     Intrustion Detection and Prevention Systems

d)     Sensors

16) Anomaly detection is based on the normal behaviour of a subject for example, a aser or a system to check any action that differs largely from the normal behaviour. it is considered intrusive.

a)     True

b)     False        D



17) Which of the following IDS scans network packets at the router or host-level, audits packet information, and logs any suspicious packets into a speccial log file with extended information?

a)     DIDS

b)     NIDS        D

c)     HIDS

d)     IDPS

18) which of the following response is most commonly used, inexpensive, and easy to practice?

a)     Active Response            D

b)     Passive Response

19) _______ is more complex as it provides more complex interactions with attackers by incorporating actual operating systems and services. It can capture a large amount of information about an attacker.

a)     Low-interaction honeypot

b)     High-interaction honeypot          D

c)     Mid-interaction honeypot

d)     none of the above

20) _________ cryptography technique uses the same private key for both ancrypting and decrypting the data?

a)     Diffie-Hellman key exchange

b)     RSA

c)     DES           D

d)     PKC

21) A ________, also called a message digest, is a number gennerated from a string of text.

a)     A hash algorithm

b)     The Secure Hash Algorithmn (SHA)

c)     A hash value      D

d)     RACE Integrity Primitives Evaluation Message Digest (RIPEMD)

22) In ________ attacking techniques does the attacker try to find loopholes in the implementation of the algorithm instead of attacking the algorithm?

a)     Man in Middle Attack

b)     Meet-in-the-Middle Attack

c)     Side Channel Attack              D

d)     Brute Force Attack

23) _________ DES techniques is vulnerable to meet-in-the-middle attack?

a)     DES

b)     2DES         D

c)     3DES/2

d)     3DES/3

24) ________ is vulnerable to man-in-middle attacks?

a)     RSA

b)     Feistel’s Cipher Scheme

c)     Digital signature

d)     Diffie-Hellman key exchange          D



25) _________ take part in securing communications with other computers using communication protocols such as SSL?

a)     Certificate Authority Cerfiticates

b)     Personal Cerfiticates

c)     Server Cerfiticates                 D

d)     Software Publisher Certificates

26) ________ is a SSL protocol that initiates a client-server session?

a)     Clap

b)     Handshake         D

c)     Bye

d)     Greet

27) IPsec is used to secure Intenet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session.

a)     True          D

b)     Fasle

28) Kerberos uses _________ port by default.

a)     88            D

b)     44

c)     8080

d)     4040

29) _________ protects against replay attacks by utilizing the sliding window technique and discarding old packets.

a)     ESP

b)     AH            D

c)     SSL

d)     TCP

30) By using IP protocol number _________, ESP operates directly on top of IP

a)     88

b)     23

c)     75

d)     50            D

31) Which of the following correctly identifies redundant connections?

a)     Two network cards in computers, which are connected to different switches or hubs.

b)     Two different sites, which are connected through network

c)     A backup site, which is an exact replica of the actual server room

d)      Multiple ISP connections           D

32) Risk mitigation involves developing a plan of action after proper analysis of the _______

a)     Computer systems

b)     Policies and Procedures of the company

c)     Security Standards

d)     Risk assessment             D

33) Identification of the potential monetary impact of a risk is also known as _________

a)     Risk assessment

b)     Risk mitigation

c)     Impact assessment             D

d)     d) Vulnerability assessment

34) What do you call an event that is considered a risk initially, but doesn’t turn out to be a risk?

a)     Vulnerability

b)     Redundant risk

c)     False positive       D

d)     Low risk

35) A LAN Surveyor is used for __________.

a)     Network Mapping        D

b)     Vulnerability scanning

c)     Sniffing

d)     Password analysis

36) _________ refers to prevention of data signals from being affected by external sources.

a)     HVAC

b)     Shielding      D

c)     Scanning

d)     Sniffing

37) ________ consists of a vast database of server names and their corresponding IP addresses.

a)     Open SSH distribution

b)     DNS    D

c)     DOS

d)     DACL

38) Entries in the server have been maliciously modified although the victimcontinues to trust the responses supplied by the server is called as Cache Poisoning.

a)     True    D

b)     False

39) In _________ a LAN poisons the ARP table of another host and causes it to send packets to the wrong destination.

a)     Cache Poisoning

b)     DNS Spoofing

c)     ARP Poisoning       D

d)     Network Poisoning

40) DNS cache poisoning occurs when a user tricks a DNS server and believes that a false response of DNS  query is vailid

a)     True

b)     False       D

41) A _______ prevent the DNS server forwarding the requests from interacting with Internet DNS server

a)     DNS Attacker

b)     DNS Forwarder  D

c)     DNS client

d)     DNS host

42) The network requests supporting DNS lookups  run over TCP and UPD, port _______ by default.

a)     53               D

b)     55

c)     35

d)     65


43) Internet explorer is a ______

a)     Web server

b)     Web browser       D

c)     Network protocol

d)     Temporary file

44) Which is attack in which the attacker takes over the web session?

a)     Hijacking

b)     SQL injection         D

c)     Account harvesting

d)     Session replay

45) ________ is a program that changes some settings in a web browser.

a)     Cookie    D

b)     ActiveX

c)     Browser parasite

d)     Digital signature

46) _________ is the standard security technology for establishing an encrypted link between a web server and a browser

a)     FTP

b)     HTTP

c)     SSL        D

d)     SQL

47) Which one of the following plug-in is more dangerous?

a)     ActiveX      D

b)     Java Applet

c)     JavaScript

d)     Flash Player

48) _________ occurs when a malicious user purposefully enters data into a database that will cause an error in its processing .

a)     Hijacking

b)     SQL injection                 D

c)     Account harvesting

d)     Session replay

49) ________ is a method of providing false identify information to gain unauthorized access to a service by modifying the source address of traffic or source of information.

a)     Spoofing       D

b)     Spamming

c)     Malware

d)     Phishing

50) Which is a way to stop spam emails?

a)     Reply to the spam mail

b)     Unsubscribe to the spam mail        D

c)     Using a spam filter

d)     Click the ‘remove’ link in the mail



51) ______ is a common tool used by spammers.

a)     Authentication

b)     Encryption

c)     Spambots            D

d)     Spam blocker

52) ________ is a Microsoft-proprietary protocol used for email authentication?

a)     NTLM/SPA             D

b)     Kerberos

c)     PGP

d)     GPg4Win

53) Which of the following statement about Kerberos is true?

a)     Kerberos is freely available from IIT.

b)     Kerberos uses secret-key cryptography for encrypting data to make it secure.           D

c)     The user’s password passes through the network in Kerberos.

d)     Kerberos is a military grade encryption program that is used to scramble (encrypt) and unscramble (decrypt) data.

54) ______ is essential for implementing distributed procedures over a network and for delivering file-system updates.

a)     Honeypost

b)     IDS

c)     Synchronized time

d)     NTP          D

55) _________ are stand-alone devices that can detect attacks on a network or a computer.

a)     Router

b)     IDS             D

c)     Honeypots

d)     Firewall

56) _________ contains information about the network traffic?

a)     Company security policy

b)     Firewall’s logs         D

c)     NDA

d)     Employee mails

57) _________ allows multiple computers to connect to the Internet using a single public IP address.

a)     Firewall

b)     Egress filtering

c)     DMZ

d)     NAT       D

58) _________ is the practice of reducing the vulnerabilities in your hardware.

a)     Hardening

b)     Network Address Translation

c)     Intrusion detection

d)     Vulnerability testing             D



59)_________ refers to the method of keeping computers upto-date with new software releases that are developed after an original software product is installed.

a)     Pop-up blocker

b)     DHCP

c)     Patch management            D

d)     Baselining

60) The most vulnerable entity in any organisation is the ______.

a)     Server room

b)     End-user

c)     Reception area

d)     Installed software         D

61) A host-based firewall is a personal firewall or software program that is installed on .

a)     Servers

b)     Client systems             D

c)     Mobile phones

d)     Memory cards and USB drives

62) ________ is a measure of normal activity.

a)     Baselining          D

b)     Filtering

c)     Encryption

d)     Decryption

63) _________ is the simulation of the software/hardware.

a)     Virtualization            D

b)     Firewall

c)     DLP

d)     XSS

64) A ________ is used to generate a temporary single-use password to make the authentication stronger.

a)     Smart card

b)     Biometric

c)     Token              D

d)     RADIUS

65) When happens when a user attempts to log on, but repeatedly types in wrong password?

a)     The account is disabled

b)     The account is deleted

c)     The account is locked       D

d)     The account is enable

66) __________ defines rules for access control in Rule Based Access Control?

a)     User

b)     System administrator            D

c)     Group

d)     Chairman of the company

67) ________ is generally used by government and military environments.

a)     Mandatory Access Control             D

b)     Discretionary Access Control

c)     Role based Access Control

d)     Rule Base Access Control

68) The ________ used in an authentication process makes authentication resilient and reliable.

a)     Unique factors

b)     Process time          D

c)     Software

d)     Operating system

69) What are the factors required in a strong password?

a)     Five characters

b)     Eight characters

c)     One number

d)     14 characters or more         D

70) The act exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would be protected from an application or user is defined as ________.

a)     Backdoors

b)     Privilege escalation           D

c)     Network Intrusion Prevention Systems (NPS)

d)     Crosstalk

71) The transmission of data across electromagnetic signals is known as _________.

a)     Crosstalk

b)     Network accessing

c)     Data emanation          D

d)     Electro Magnetic Interference

72) The sending of unwanted messages to Bluetooth-enable devices such as mobile phones and Personal Digital Assistant (PDA) is termed  as _________.

a)     Bluesnarfing

b)     Bluejacking             D

c)     Bluetooth

d)     Wardriving


1)     _________ is a popular banking scam all over the word.

a)     Phishing         D

b)     Attack

c)     Threat

d)     None of the above

2)      In ‘ Penetration testing’, both the ethical hacker and a malicious hacker carry out the same steps for hacking and vulnerability assessment, but their motives are different. State True or False.

a)     True         D

b)     False

3)      Which type of hacker hacks with malicious intentions?

a)     Greeen-hat hackers

b)     White-hat hackers

c)     Black-hat hackers           D

d)     Red-hat hackers



4)      A situation or an environment leading to a security breach that can have a devastating effect on a business is called

a)     Exploit

b)     Threat            D

c)     Vulnerability

d)     Remote attack

5)      _________ means to gain information about a target computer or network without the knownledge or prior approval of the target.

a)     Scanning

b)     Reconnaissance             D

c)     Launching

d)     Steganography

6)      Using the Google search engine for gathering required information is known as _______

a)     Online hacking

b)     Google hacking            D

c)     Network hacking

d)     None of above

7)      Trellian is a competitive intelligent tools.

a)     Trellian         D

b)     Whois

c)     ARIN

d)     SAM Spade

8)      Banner grabbing is a graphical tool used for Advanced DNS.

a)     True

b)     False          D

9)      The open source utility Zenmap (Network Mapper) is used for what purposes?

a)     Network discovery            D

b)     Fingerprinting

c)     Crawling

d)     Scan addresses

10) Sam Spade is a combination of many utilities like whois, _______, finger, and DNS lookup.

a)     Port Scan

b)     Traceroute

c)     EmailTrackerPro     D

d)     none of the above

11) Penetration testing is also known as ________

a)     Pentest             D

b)     Testpen

c)     Pencitest

d)     None of the above

12) ________ and _______ are popular pentest tools.

a)     Hermitage and Shark attack

b)     Pegasus and Metapolice

c)     Armitage and Nessus           D

d)     None of the above

13) The general penetration testing methodology consists of three phases namely, Reconnaissance, ______, and Verification.

a)     Testing

b)     Scanning               D

c)     Auditing

d)     None of the above

14) In the assessment phase, Audit is a necessary step.

a)     True

b)     False          D

15) _________ is a password recovery tool.

a)     Brute force

b)     Cain           D

c)     Cryptanalysis

d)     None of the above

16) The main goal of _________ is to get a fair idea of the target.

a)     Footprinting

b)     Enumeration           D

c)     Scanning

d)     Pinging

17) A connection to the sharer that does not have a specified user name or password is known as a _______.

a)     Null Session           D

b)     Blocked Session

c)     Privileged session

d)     Specific Session

18) Which protocol is used for coordinating the clocks of networked computer systems during data transfer through the internet?

a)     HTTP (Hypertext Transfer Protocol)

b)     SNMP (Simple Network Management Protocol)

c)     SNTP (Simple Network Time Protocol)             D

d)     FTP (File Transfer Protocol)

19) SNMP Enumeration helps you to enumerate directories and files by using methods that return an enumerable collection of strings of their names. State true or false

a)     True

b)     False                 D

20) _________ is a message that is received from a host with signature of application issuing the message that is viewable.

a)     Telnet

b)     Banner                D

c)     ICMP

d)     None of the above

21) _________ allow a network manager to maintain the traffic flow efficiently.

a)     Protocols

b)     Sniffers               D

c)     Session Hijacking

d)     Mac flooding

22) The Sniffer software capture packets that are not meant for the sniffer system’s MAC address but for a specific destination MAC addresswhich is known as promiscuous mode.

a)     True          D

b)     False

23) The __________ in promiscuous mode reads all traffic and sends it to sniffer for processing

a)     Cable

b)     NIC             D

c)     Switch

d)     Router

24) In ________, fake ARP messages are issued by the attacker onto a LAN.

a)     Sniffing

b)     Flooding

c)     Spoofing                D

d)     Phishing

25) ________ include filters, colour-cording , and other features that monitors network traffic and inspects individual packets.

a)     Wireshark                D

b)     Ethernet

c)     Packets

d)     Juggernaut

26) _________ are fake computer programs which are designed to trick the user to buy dangerous and unnecessary software like fake antivirus protection.

a)     Firmware

b)     Freeware

c)     Scareware            D

d)     Fakeware

27) Monique and Francoise developed the _________ model.

a)     Social Engineering Attack Detection          D

b)     Social Networking

c)     Technical assessment

d)     Social Security

28) To curtail Socical Engineering attacks, companies should create a _________.

a)     Network of systems

b)     Central information collection system        D

c)     Security data collection office

d)     Alert System

29)Assets that you cannot see, or those that exist on paper or on a hard disk are called ______ assets.

a)     Tangible

b)     Intangible               D

c)     Economic

d)     Fixed




30)When an attacker manipulates people in an organization to share confidential information, so that the computers in that particular organization can be accessed, it is called _________.

a)     `Information engineering

b)     Social engineering          D

c)     Computer engineering

d)     None of the above

Chuong 14

  1. A…..monitors network traffic for suspicious activity and alerts the system or network administrator
    1. iDS     D
    2. IP
    3. Honey pot
    4. Trap
    5. ……is a technique used by attackers to bypass IDS
      1. Flooring
      2. Flooding              D
      3. Fooling
      4. Penetrating
      5. IDS approach the goal of detecting suspicious traffic in only one way
        1. True
        2. False          D
        3. Anomaly Based is atype of a server that has a firewall attached to it
          1. True
          2. False      D
          3. Many IDPS can also respond to a detected threat by attermpting to prevent it from succeeding
            1. True       D
            2. False

Chuong 13

  1. LSA stands for local security ………
    1. Agency
    2. Association
    3. Authozity        D
    4. Agreement
    5. Group policy iis a feature in the…………operating system
      1. Linux
      2. Solaris
      3. Windows NT   D
      4. Mac
      5. The first rule for editing the registry is that the registry must be……….
        1. Backed up                 D
        2. Deleted
        3. Restarted
        4. Copied
        5. The import facility of regedit can be used to make a copy of the registry key
          1. True
          2. False                D
          3. The Sam file in windows XP stores the user’s password in a  ……format
            1. Hash                D
            2. Clear text
            3. Alpha muberic
            4. binary


Chương 12.

  1. Wireless network is a network set up by using ______ frequency.

a)     Mobile signal

b)    Antenna signal

c)     Radio signal    D

d)    None of the above

  1. The ____ links two or more devices using a wireless distribution method.

a)     WAN

b)    LAN       D

c)     PAN

d)    CAN

  1. _______ handles the overall authentication process of the user’s session on the wireless device.

a)     Circumference

b)    RADIUS          D

c)     Circle

d)    Perimeter

  1. Open System authentication allows any user to authenticate to the access point.

a)     True       D

b)    False

  1. One of the tools used by War Driving is ______.

a)     Tumbler

b)    Spoofing

c)     NetStumbler    D

d)    Driving tool


Chương 11

  1. ______ is a code injection technique that weakens the system’s information assurance in a Website’s software.

a)     RDBMS

b)    SQL injection  D

c)     PHP

d)    None of the above

  1. SQL injection is used to exploit Websites by changing backend SQL statements by manipulating application input.

a)     True       D

b)    False

  1. One of the steps to secure Website and Web applications from SQL injection is:

a)     Analyze the physical connection of Webserver

b)    Perform irregular Web security audit

c)     Ensure to sanitize Web applications      D

d)    None of the above

  1. Submitting a query that uses the ____ clause allows partial matcching of names or email addresses in the database

a)     Same

b)    Similar

c)     Match

d)    Like        D

  1. ___________ is a sophisticated SQL injection tool for easy SQL injection process

a)     SQL tool

b)    Havji      D

c)     Database Mon

d)    Backend SQL


Chương 10

  1. __________ is a type of password attack.

a)     Thesaurus attack

b)    Forceful attack

c)     Brute Force attack    D

d)    Password attack

  1. To avoid password reuse, _______ were developed.

a)     Strong passwords

b)    Character passwords

c)     Special character passwords

d)    One time passwords D

  1. This is not a type of password attack.

a)     DoS       D

b)    Brute force

c)     Dictionary

d)    None of the above

  1. What you can do and what you desire are some authentication methods.

a)     True       D

b)    False

  1. __________ is a hacking tool.

a)     Nagios

b)    John the Ripper        D

c)     Cacti

d)    Zabbix


Chương 9

  1. ______ helps in delivering Web content that can be accessed through the Internet.

a)     Web Site

b)    Web Server      D

c)     We Design

d)    None of the above

  1. By installing server software to any computer and connecting the machine to the Internet, any computer can be turned into a Web Server.

a)     True

b)    False      D

  1. _________ is one of the most popular and capable vulnerability scanners for UNIX systems.

a)     CoreIntact

b)    Nexpose

c)     Nessus   D

d)    Acunetix

  1. Which test is not a type of patch testing?

a)     Rollback test

b)    Verification test

c)     Standart test

d)    Process test     D

  1. A complementary security should be provided by _____ to protect operating and file systems, user accounts, and business-critical services from attacks.

a)     Firewalls                    D

b)    Trojan

c)     Keylogger

d)    Netscape


Chương 8

  1. Bots are also known as ________ .

a)     Browsers

b)    Web Robots    D

c)     Network hacking tools

d)    Commands

  1. Websites with large ________ are not affected by DoS attacks.

a)     Bandwidth       D

b)    Data Storage

c)     Coding

d)    None of the above

  1. Smurf attack does not generate heavy computer network traffic on the network of the victim’s computer.

a)     True       D

b)    False

  1. What is a micro block?

a)     Defensive technique

b)    Scanning method

c)     Network attack                   D

d)    Command prompt

  1. The ________ create spam, spread viruses, and perform online crimes and malpractices.

a)     Smurf attack

b)    Mailbomb

c)     Zombies           D

d)    Ping flood


Chương 7

  1. The types of buffer attacks are ________

a)     Heap based and stack based                  D

b)    Memory based

c)     Operating system based

d)    RAM based

  1. The C programming language supplied the framework for buffer overflow attacks.

a)     True                 D

b)    False

  1. When a return address is overwitten with the address of an opcode, it is called ______.

a)     Overwiting

b)    Trampolining            D

c)     Opcoding

d)    Buffering

  1. A ______ is an area of physical memory storage which is used to prevent data from moving into another area.

a)     Buffer              D

b)    Upper

c)     Lower

d)    Middle

  1. ________ helps to store data during the run time.

a)     Heap

b)    Stack               D

c)     Virtual

d)    Data bus






About dongpolicex2

Check Also

Linux ping Command Options

Question 1. How to use ping command? Begin with Ctrl + Alt + T for …

Leave a Reply

Your email address will not be published. Required fields are marked *

0945 680 887