Sei sulla pagina 1di 8

Name:

Branch:

1. What is the destination address in an ARP broadcast packet


a. 255.255.255.255
b. 0.0.0.0
c. 2001:0db8:85a3:0000:0000:8a2e:0370:7334
d. ff:ff:ff:ff:ff:ff
2. Administrator have configured an inbound access list on a serial interface
to deny the packet entry for tcp and udp port 21,23,25. Now, what type of
packet will be passing through the network :
a. SMTP
b. HTTP
c. FTP
d. TELNET
3. What is the maximum frame size supported by 1G Ethernet?
a. 1518
b. 1500
c. 1514
d. 1024
4. Which of the following protocol allows you to trap particular events taking
place on a system and send them to a central monitor system?
a. SMTP
b. SSTP
c. SNMP
d. BTP
5. What will be the subnet mask if 18 bits are reserved for the network
addressing?
a. 255.255.255.255
b. 255.255.192.0
c. 255.255.128.0
d. 255.255.0.0
6. Which IPv4 address represents subnet broadcast addresses?
a. 192.168.4.63/26
Name:
Branch:

b. 192.168.4.51/27
c. 192.168.4.29/24
d. 192.168.4.128/27
7. Which service is used when the nslookup command is issued on a
computer?
a. FTP
b. DNS
c. DHCP
d. VLOOK

8. Considering the following command below, which of the following


statements is true?
ln file1 file2
a. file2 will be symbolically linked to file1
b. Regardless of the size of file1, file2 will have a size of 5 bytes
c. file1 and file2 have the same inode number
d. All of the above
9. What are the numeric permissions on a file with permissions of -rwxr-x---
after you run the command?
chmod g+s file
a. 2750
b. 750
c. 751
d. None of the above
10.Which of the following characters at the beginning of a filename will cause
it to be hidden?
a. #
b. .
c. @
d. ~

11.Network Time Protocol (NTP) by default works on port number:


Name:
Branch:

a. 123
b. 246
c. 369
d. 110
12.Which program is used to share files and printers between unix and
windows machines
a. Samba
b. Dovecot
c. winscp
d. cups
13.Which of the following statements is not true ?
a. A process terminates if we call function exit.
b. A process terminates if any of its thread returns from its start
routine.
c. A process terminates after returning from main function.
d. A process terminates after calling abort function.
14.Which of the following protocol provides either authentication or
encryption, or both, for packets at the IP level?
a. ESP
b. AH
c. SSL
d. PGP

15.Using public-key cryptography, suppose Ashish wants to send a message to


Shristi, and Shristi wants to be sure that the message was indeed sent by
Ashish only. Then Ashish should (choose the appropriate scenario)
a. Encrypt the message with Shristi’s private key and send the encrypted
message to Shristi.
b. Encrypt the message with Shristi’s public key and send Shristi the
message.
c. Encrypt the message with his public key and send Shristi the message.
d. Encrypt the message with his private key and send the encrypted
message to Shristi
Name:
Branch:

16.One of the most common and the best way of cracking RSA encryption is to
begin to derive the two prime numbers, which are used in the RSA PKI
mathematical process. If the two numbers p and q are discovered through a
____________ process, then the private key can be derived by
a. Factorization
b. Brute-Forcing
c. Prime Detection
d. Hashing
17.What would indicate that a message had been modified?
a. The public key has been altered.
b. The private key has been altered.
c. The message digest has been altered.
d. None of these

18.__________ cipher does not replace the original text with different text,
but rather moves the original values around. It re-arranges the bits,
characters, or blocks of characters to hide the original meaning.
a. Substitution
b. XORing
c. Transposition
d. Transportation

19.Reflected Cross Site Scripting is a :


a. Client Side Vulnerability
b. Server Side Attack
c. Injection Attack
d. None of these
20.Which of the following is not a cookie attribute:
a. Secure
b. Domain
c. Path
d. Validity
21.SQL Injection occurs due to:
Name:
Branch:

a. Improper Input Sanitization


b. Improper Output Encoding
c. Improper Query Formation
d. All of these
22.HTTP is a:
a. Stateless Protocol
b. Stateful protocol
c. UDP Service
d. (a) and (c)
23.Client Side validation can be bypassed by:
a. MITM attack
b. DNS Amplification attack
c. Intercepting Proxy
d. All of these
24.The recommended size of session ID is:
a. 68-bits
b. 112-bits
c. 128-bits
d. 512-bits
25. Which of these is a process of writing the state of an object to a byte
stream?
a. Serialization
b. Externalization
c. File Filtering
d. All of these
26.Which of the following is not a HTTP Method?
a. POST
b. TRACE
c. CONNECT
d. FILTER
27.Terri works for a security consulting firm that is currently performing a
penetration test on a financial institution. Terri's duties include bypassing
Name:
Branch:

the firewalls and switches to gain access to the network. From an outside
address, Terri sends an IP packet to one of the company's switches with the
ACK bit and the source address of her machine. What is Terri trying to
accomplish by sending this IP packet?
a. Trick the switch into thinking it already has a session with Terri's
computer
b. Poison the switch's MAC address table by flooding it with ACK bits
c. Crash the switch with a DoS attack since ACK bits cannot be sent by
computers, only switches
d. Macof attack
28.The nmap scan which uses FIN,PSH and URG flag is known as:
a. XMAS Scan
b. FIN Scan
c. ACK Scan
d. SYN Scan
29.The Nmap Scan which will not determine the open port but used to map
out firewall rulesets
a. XMAS Scan
b. FIN Scan
c. ACK Scan
d. SYN Scan
30.What is an SSID used for on a WLAN?
a. To secure the WLAN
b. To manage the WLAN settings
c. To identify the WLAN
d. To configure the WLAN AP
31.Which virus rewrite itself completely after each iteration ?
a. Polymorphic virus
b. Multipartite virus
c. Macro virus
d. Metamorphic virus
Name:
Branch:

32.To test your website for vulnerabilities, you type in a quotation mark (\ for
the username field. After you click Ok, you receive the following error
message window:

What can you infer from this error window?


a. SQL injection is not possible
b. SQL injection is possible
c. The user for line 3306 in the SQL database has a weak password
d. The quotation mark (? is a valid username
33.On Linux/Unix based Web servers, what privilege should the daemon
service be run under?
a. Guest
b. You cannot determine what privilege runs the daemon service
c. Root
d. Something other than root
34.What happens when a file is sent to the recycle bin in NFTS?
a. The file is deleted.
b. The file is removed from the file allocation table.
c. The cluster is marked as deleted in MFT.
d. The cluster is marked as available.
35.If you copy a file between two folders on different partitions, what
permissions with the file have after being copied?
a. The source folder
b. Neither folder
c. The destination folder
d. The source partition
36.A virus that changes as it spreads is called what?
a. Multipartite
Name:
Branch:

b. Armored
c. Changeling
d. Polymorphic

37.When discussing IDS / IPS, what is a signature?


a. An electronic signature used to authenticate the identity of a user
on the network.
b. Attack-definitionfile8
c. It refers to "normal," baseline network behaviour
d. None of the above

38.What is a false negative?


a. Results when an attack or an intrusion goes undetected
b. An alert sent to an incorrect management station
c. There is no such thing as a false negative
d. Results when the IDS system reports an alarm, although an actual
intrusion doesn’t occur on the network
39. The OSI model has _______ layers.
a) 4
b) 5
c) 6
d) 7
40.Which layer is responsible for process to process delivery?
a) network layer
b) transport layer
c) session layer
d) data link layer

Potrebbero piacerti anche