------------ GOOD LUCK ON THE EXAM ----------------- 1) In Buffer - - PDF document

good luck on the exam
SMART_READER_LITE
LIVE PREVIEW

------------ GOOD LUCK ON THE EXAM ----------------- 1) In Buffer - - PDF document

------------ GOOD LUCK ON THE EXAM ----------------- 1) In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code? A. EIP B. ESP C. EAP D. EEP Ans: A 2)Which type of scan does not


slide-1
SLIDE 1
  • ----------- GOOD LUCK ON THE EXAM -----------------

1) In Buffer Overflow exploit, which of the following registers gets

  • verwritten with return address of the exploit code?
  • A. EIP
  • B. ESP
  • C. EAP
  • D. EEP

Ans: A 2)Which type of scan does not open a full TCP connection?

  • A. Stealth Scan
  • B. XMAS Scan
  • C. Null Scan
  • D. FIN Scan

Ans: A 3)How do you prevent a hacker from launching FIN, NULL, and X- MAS scans on your network?

  • A. Modify the kernel to never send reset packets
  • B. Block TCP/IP packets with FIN flag enabled at the firewall
  • C. Enable IDS signatures to block these scans
  • D. You cannot block a hacker from launching these scans on your

network Ans: A 4) Which of the following encryption is not based on block cipher?

  • A. DES
  • B. Blowfish
  • C. AES (Rijndael)
  • D. RC4

Ans: D 5)TCP/IP Session Hijacking is carried out in which OSI layer?

  • A. Transport layer
slide-2
SLIDE 2
  • B. Datalink layer
  • C. Network Layer
  • D. Physical Layer

Ans: A 6)What defensive measures will you take to protect your network from password brute forcing attacks? (Select all that apply)

  • A. Never leave a default password.
  • B. Never use a password that can be found in a dictionary.
  • C. Never use a password related to the hostname, domain name, or

anything else that can be found with whois.

  • D. Never use a password related to your hobbies, pets, relatives, or

date of birth.

  • E. Use a word that has more than 21 characters from a dictionary

as the password Ans: A,B,C,D 8)What attacks can you successfully launch against a server using the SYN/ACK technique?

  • A. Session Hijacking attacks
  • B. Denial of Service attacks
  • C. Web page defacement attacks
  • D. IP spoofing attacks

Ans: A 9)How do you penetrate high security systems such as banks?

  • A. Try to hang around the local pubs or restaurants near the bank,

get talking to a poorly-paid or disgruntled employee, and offer them money if they’ll abuse their access privileges by providing you with sensitive information.

  • B. Look for “zero-day” exploits at various underground hacker

websites in Russia and China and buy the necessary exploits from these hackers and target the bank’s network.

slide-3
SLIDE 3
  • C. Launch DDOS attacks against Merclyn Barley Bank’s routers

and firewall systems using 100,000 or more “zombies” and “bots”.

  • D. Try to conduct Man-in-the-Middle (MiTM) attack and divert

the network traffic going to the Merclyn Barley Bank’s Webserver to that of your machine using DNS Cache Poisoning techniques Ans: A 11)You can always defend yourself by "ignorance of the law" clause. (True or False) Ans: False 12)You are configuring the security options of your mail server and you would like to block certain file attachments to prevent viruses and malware from entering the users inbox. Which of the following file formats will you block? (Select all that apply)

  • A. .pif
  • B. .scr
  • C. .txt
  • D. .com
  • E. .exe
  • F. .rar
  • G. .vbs
  • H. .hta
  • I. .jpg

Ans: A,B,D,E,G,H 13)This tool floods the switch with bogus MAC addresses

  • A. ./macof

B ./sniffof

  • C. ./dsniff
  • D. ./switchsnarf
slide-4
SLIDE 4

Ans: A 14)Two types of BO

  • A. Stack based buffer overflow
  • B. Active buffer overflow
  • C. Dynamic buffer overflow
  • D. Heap based buffer overflow

Ans: A,D 16)Fingerprinting an Operating System helps a cracker because: (Select the Best Answer)

  • A. It defines exactly what software you have installed
  • B. It opens a security delayed
  • C. window based on the port being scanned
  • D. It informs the cracker of which vulnerabilities he may be able to

exploit on your system

  • E. It doesn't depend on the patches that have been applied to fix

existing security holes Ans: D 17)What does the term ''Ethical Hacking'' mean? (Select the Best Answer)

  • A. Someone who is hacking for ethics reasons
  • B. Someone who is using their skills for ethics reasons
  • C. Someone who is using their skills for defensive purposes
  • D. Someone who is using their skills for offensive purposes

Ans: C 18)Which of the following best describes Vulnerability? (Select the Best Answer)

  • A. A weakness or error that can lead to a compromise
  • B. An agent that could take advantage of a weakness
  • C. An action or event that might prejudice security
  • D. The loss potential of a threat

Ans: A

slide-5
SLIDE 5

20)What sequence of packets is sent during the initial TCP three way handshake? (Select the Best Answer)

  • A. FIN, FINACK,
  • B. ACK
  • C. SYN, URG, ACK
  • D. SYN, ACK, SYNACK
  • E. SYN, SYNACK,

Ans: E 21)An attacker has successfully compromised a remote computer. Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source

  • f the problem? (Select the Best Answer)
  • A. Install patches
  • B. Setup a backdoor
  • C. Cover your tracks
  • D. Install a zombie for DDOS

Ans: C 23)Within the context of Computer Security, which of the following statements describe Social Engineering best? (Select the Best Answer)

  • A. Social Engineering is the act of publicly disclosing information
  • B. Social Engineering is the act of getting needed information from a

person rather than breaking into a system

  • C. Social Engineering is the means put in place by human resource to

perform time accounting

slide-6
SLIDE 6
  • D. Social Engineering is a training program within sociology studies

Ans: B 24)Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate. How would you call this type of activity? (Select the Best Answer)

  • A. CI Gathering
  • B. Scanning
  • C. Dumpster Diving
  • D. Garbage Scooping

Ans: C Ans: B 26) What is the essential difference between an 'Ethical Hacker' and a 'Cracker'?

  • A. The ethical hacker does not use the same techniques or skills as

a cracker.

  • B. The ethical hacker does it strictly for financial motives unlike a

cracker.

  • C. The ethical hacker has authorization from the owner of the

target.

  • D. The ethical hacker is just a cracker who is getting paid.

Ans: C Section: (none) 27) What does the term "Ethical Hacking" mean?

  • A. Someone who is hacking for ethical reasons.
  • B. Someone who is using his/her skills for ethical reasons.
  • C. Someone who is using his/her skills for defensive purposes.
  • D. Someone who is using his/her skills for offensive purposes.

Ans: C

slide-7
SLIDE 7

29) You are foot printing an organization to gather competitive

  • intelligence. You visit the company's website for contact information

and telephone numbers but do not find it listed there. You know that they had the entire staff directory listed on their website 12 months ago but not it is not there. How would it be possible for you to retrieve information from the website that is outdated?

  • A. Visit Google’s search engine and view the cached copy.
  • B. Visit Archive.org web site to retrieve the Internet archive of the

company's website.

  • C. Crawl the entire website and store them into your computer.
  • D. Visit the company's partners and customers website for this

information. Ans: B Section: (none) 31) Which of the following keyloggers cannot be detected by anti-virus

  • r anti-spyware products?
  • A. Covert keylogger
  • B. Stealth keylogger
  • C. Software keylogger
  • D. Hardware keylogger

Ans: D 32) A Buffer Overflow attack involves:

  • A. Using a trojan program to direct data traffic to the target host's

memory stack

  • B. Flooding the target network buffers with data traffic to reduce

the bandwidth available to legitimate users

  • C. Using a dictionary to crack password buffers by guessing user

names and passwords

slide-8
SLIDE 8
  • D. Poorly written software that allows an attacker to execute

arbitrary code on a target system Ans: D 34) A majority of attacks come from insiders, people who have direct access to a company's computer system as part of their job function or a business relationship. Who is considered an insider?

  • A. The CEO of the company because he has access to all of the

computer systems

  • B. A government agency since they know the company computer

system strengths and weaknesses

  • C. Disgruntled employee, customers, suppliers, vendors, business

partners, contractors, temps, and consultants

  • D. A competitor to the company because they can directly benefit

from the publicity generated by making such an atta Ans: C 38) Currently we are using which IP PROTCOL

  • A. IP4
  • B. IP6
  • C. IP3
  • D. IP5

Ans: A 39) For Asia which is the regional Internet registry

  • A. ARIN B) RIPE C) LACNIC D) APNIC

Ans D 40 Steganography works on-

  • A. Audio files
  • B. Video files
  • C. Images
  • D. All of the above

Ans: D

slide-9
SLIDE 9

41) Software tools that employ steganography to-

  • A. Hides data inside of other files
  • B. Replaces data inside files
  • C. Hides data outside files
  • D. None of the above

Ans: A 42) The steganography process generally involves placing a hidden message in some transport medium, called-

  • A. Medium
  • B. Carrier
  • C. Codes
  • D. Semagrams

Ans: A 43) What is malicious, surreptitious software that monitors your keystrokes, logging them to a file and keeps sending them off to remote attackers?

  • A. Trojan
  • B. Encoders
  • C. Keylogger
  • D. Virus

Ans: C 44) Smtp address for gmail is

  • A. smpt.gmail.com
  • B. smtp.gmail.com
  • C. smtp.google.com
  • D. smtp.gmailcom

Ans: B 45) Default port for smtp is

  • A. 525
  • B. 587
slide-10
SLIDE 10
  • C. 465
  • D. 25

Ans: D 46) In 2 step verification of gmail the code is send on

  • A. Mobile
  • B. Recovery email id
  • C. Alternate email id
  • D. None of the above

Ans: A 47) Facebook uses which method/medium to collect the user data

  • A. Browser
  • B. Cookie injection
  • C. Adsense
  • D. all of the above

Ans: C 48) A static ip:

  • A. remains constant throughout
  • B. changes everytime a user logs in again
  • C. both a & b
  • D. can’t say

Ans: A 50) 172.33.16.2 is a:

  • A. Private ip
  • B. Public ip
  • C. Can’t say
  • D. It is an invalid address

Ans: B

slide-11
SLIDE 11

51) ISP stands for:

  • A. International service provider
  • B. Internet standard protocol
  • C. Internet service provider
  • D. Internet surveillance port

Ans: C 52) Which is a private ip

  • A. 10.1.2.3
  • B. 172.54.33.254
  • C. 192.10.10.10
  • D. 121.10.192.10

Ans: A

  • 53. The IP range of 127 is
  • A. Reseved by google
  • B. Reseved by facebook
  • C. Reseved by army
  • D. Is a loopback address

Ans: C 54) 192.168.1.101 is which ip?

  • A. Internal
  • B. External
  • C. Public
  • D. Private

Ans: A 56) What is the extension of autorun files

  • A. .exe
  • B. .inf
  • C. .bat
  • D. txt

Ans: B

slide-12
SLIDE 12

57) USB flash security is a

  • A. encryption tool
  • B. password protection tool
  • C. data hiding tool
  • D. all of the above

Ans: D 58) USB Grabber copies data from pen drive to computer A.True

  • B. False

Ans: False 59) Data is lost if encrypted pen drive is formatted A True

  • B. False

Ans: B 62) Encrypted file can be opened by the same software only which was used for encryption

  • A. True
  • B. False

Ans: B 63) Lan messages can be encrypted using which software

  • A. Axctrypt
  • B. Lan crypt
  • C. Crypto forge
  • D. Communicrypt

Ans: D 64) Encrypted mails require compulsory private key

  • A. True
  • B. False

Ans: B

slide-13
SLIDE 13

67) ALM registry is a

  • A. Virus scanner
  • B. Anti-keylogger
  • C. Registry cleaner
  • D. Rootkit

Ans: C 68) kl-detector is

  • A. Virus scanner
  • B. Anti – keylogger
  • C. Registry cleaner
  • D. Rootkit

Ans: B 69) Sandbox saves the files in

  • A. Virtual box
  • B. Sandbox folder
  • C. C drive
  • D. Virtual drive

Ans: B 70) which software removes the data as soon as the machince restarts

  • A. Wondershare
  • B. Ccleaner
  • C. Virtual pc
  • D. None of the above

Ans: A 71) Browser history of sandbox browser will be the same as the base pc browser ?

  • A. True
  • B. False

Ans: B 72) Which keylogger can be remotely installed

  • A. Award
  • B. Oursecret
  • C. Isafe
slide-14
SLIDE 14
  • D. Winspy

Ans: D 73) Data destroyed by Deepfreeze can be recovered?

  • A. Yes
  • B. No

Ans: B 74) Software that helps to create virtual operating system

  • A. Wondershare
  • B. Deep freeze
  • C. Vmware
  • D. Sandbox

Ans : C 75) Which wi-fi can be cracked easily

  • A. Wep
  • B. Wpa
  • C. Wpa -2
  • D. Wpa-2 psk

Ans: A 76) What is the Full form of WI-FI

  • A. Wire Free
  • B. Wire air
  • C. wireless fidelity
  • D. None of the ablove

Ans: C 77) SSID stands for

  • A. Service Set identifier
  • B. Secured socket ID
  • C. system secure Identification
  • D. subscribers secured ID
slide-15
SLIDE 15

Ans: A 78) Default IP for router is

  • A. 127.0.0.0.
  • B. 192.168.1.1
  • C. 10.0.0.0
  • D. 172.16.0.0

Ans: B 79) Backtrack is a

  • A. Unix base
  • B. Windows base
  • C. Linux base
  • D. None of above

Ans C 81) In 3 way handshake connection which packet is sent first

  • A. req
  • B. ack
  • C. syn
  • D. none of above

Ans : C 82) Backtrack is popular as a

  • A. User’s Interactive OS
  • B. Developers OS
  • C. Debugger’s OS
  • D. Hacker’s OS

Ans : D 83) Net tools is a

  • A. TCP/IP Configuration
  • B. E-mail seeker
  • C. Network Browser
  • D. Mixer of all of this

Ans D

slide-16
SLIDE 16

84) Angry IP scanner is a

  • A. Network Scanner
  • B. Web site Scanner
  • C. Port scanner
  • D. none of above

Ans C 86) How do you use the air crack commands

  • A. aircrack-ng wlan0 {.cap file name}
  • B. air crack --wlan0 {.cap file name}
  • C. aircrack-ng wlan0
  • D. air crack wlan0 {.cap file name}

Ans : A 87) How to increase the data files in Wifi hacking

  • A. aireplay-ng –3 –b (bssid) – m (mac) wlan0
  • B. . aireplay-ng –3 –b (bssid) –h (mac) wlan0
  • C. aireplay-ng –3 –h (mac) wlan0
  • D. airplay-ng –3 –b (bssid) –h (mac) wlan0

Ans : B 89) ESN stands for

  • A. Electronic serial number
  • B. Electric system notation
  • C. None of the above
  • D. Encryption serial number

Ans D 90) Call spoofing means

  • A. Changing caller id
  • B. Changing caller name
  • C. No change
  • D. None of the above
slide-17
SLIDE 17

Ans : A 92) Definition of Commincation device was inserted via ITAA2008? A True

  • B. False

Ans A 93) I.T Act was amended in 2008..it is known as A.ITAA 2008

  • B. ITA 2008
  • C. ITA
  • D. None of the above

Ans B 95) Section 65 deals with

  • A. Power of inspector
  • B. computer source code
  • C. cyber terrorism
  • D. none of the above

Ans B 97) the 4 stages of ISO 27001 implementation are known as

  • A. PDCA
  • B. PCAD
  • C. DCAP
  • D. CAPD

Ans: A 98) IMEI is of how many digits

  • A. 16
  • B. 15
  • C. 32
  • D. 12

Ans: B

slide-18
SLIDE 18

99) GPRS means A General Packet Radio Service B Generic pocket reception system C General Packet Radio System D General Package Radio Service Ans A 100) SIM card contains network provider information

  • A. Yes
  • B. No

Ans A