Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Branch:
b. 192.168.4.51/27
c. 192.168.4.29/24
d. 192.168.4.128/27
7. Which service is used when the nslookup command is issued on a
computer?
a. FTP
b. DNS
c. DHCP
d. VLOOK
a. 123
b. 246
c. 369
d. 110
12.Which program is used to share files and printers between unix and
windows machines
a. Samba
b. Dovecot
c. winscp
d. cups
13.Which of the following statements is not true ?
a. A process terminates if we call function exit.
b. A process terminates if any of its thread returns from its start
routine.
c. A process terminates after returning from main function.
d. A process terminates after calling abort function.
14.Which of the following protocol provides either authentication or
encryption, or both, for packets at the IP level?
a. ESP
b. AH
c. SSL
d. PGP
16.One of the most common and the best way of cracking RSA encryption is to
begin to derive the two prime numbers, which are used in the RSA PKI
mathematical process. If the two numbers p and q are discovered through a
____________ process, then the private key can be derived by
a. Factorization
b. Brute-Forcing
c. Prime Detection
d. Hashing
17.What would indicate that a message had been modified?
a. The public key has been altered.
b. The private key has been altered.
c. The message digest has been altered.
d. None of these
18.__________ cipher does not replace the original text with different text,
but rather moves the original values around. It re-arranges the bits,
characters, or blocks of characters to hide the original meaning.
a. Substitution
b. XORing
c. Transposition
d. Transportation
the firewalls and switches to gain access to the network. From an outside
address, Terri sends an IP packet to one of the company's switches with the
ACK bit and the source address of her machine. What is Terri trying to
accomplish by sending this IP packet?
a. Trick the switch into thinking it already has a session with Terri's
computer
b. Poison the switch's MAC address table by flooding it with ACK bits
c. Crash the switch with a DoS attack since ACK bits cannot be sent by
computers, only switches
d. Macof attack
28.The nmap scan which uses FIN,PSH and URG flag is known as:
a. XMAS Scan
b. FIN Scan
c. ACK Scan
d. SYN Scan
29.The Nmap Scan which will not determine the open port but used to map
out firewall rulesets
a. XMAS Scan
b. FIN Scan
c. ACK Scan
d. SYN Scan
30.What is an SSID used for on a WLAN?
a. To secure the WLAN
b. To manage the WLAN settings
c. To identify the WLAN
d. To configure the WLAN AP
31.Which virus rewrite itself completely after each iteration ?
a. Polymorphic virus
b. Multipartite virus
c. Macro virus
d. Metamorphic virus
Name:
Branch:
32.To test your website for vulnerabilities, you type in a quotation mark (\ for
the username field. After you click Ok, you receive the following error
message window:
b. Armored
c. Changeling
d. Polymorphic