Pregunta 1
Pregunta
What is a Trojan?
Respuesta
-
a. Backdoor malware
-
b. Virus
-
c. Worm
Pregunta 2
Pregunta
What technique does Zberb use to remain invisible on a system?
Pregunta 3
Pregunta
How can malware infections be prevented?
Pregunta 4
Pregunta
How should you check your system for infection?
Respuesta
-
a. Using checksum method to check file integrity
-
b. Using malware scanners
-
c. Checking for suspicious looking files and network connections
Pregunta 5
Pregunta
What is the use of a DoS attack Trojan?
Pregunta 6
Pregunta
A tool to monitor file integrity is:
Respuesta
-
a. Tripwire
-
b. Netcat
-
c. HiJackThis
Pregunta 7
Pregunta
Which is a port monitoring tool?
Respuesta
-
a. Carberb
-
b. CM tool
-
c. Sigcheck
Pregunta 8
Pregunta
Which tool is used for sniffing a network?
Respuesta
-
a. Billy Bastard
-
b. Ophcrack
-
c. Cain and Abel
Pregunta 9
Pregunta
How is a salted password validated?
Respuesta
-
a. Retrieve the salt and hash from the database; Append the salt and the hash again with the same algorithm; Check for the resulting password hash, match or not
-
b. Check for the resulting password hash, match or not; Retrieve the salt and hash from the database; Append the salt and the hash again with the same algorithm
-
c. Append the salt and the hash again with the same algorithm; Check for the resulting password hash, match or not; Retrieve the salt and hash from the database
Pregunta 10
Pregunta
Which utility is used for a hash insertion attack?
Respuesta
-
a. Kerbcrack
-
b. NTPASSWD
-
c. iKey 2032
Pregunta 11
Pregunta
On which system do alternate data streams work?
Pregunta 12
Pregunta
What is steganography?
Pregunta 13
Pregunta
Steganography can be used as a substitute for which encryption values?
Respuesta
-
a. symmetric
-
b. asymmetric
-
c. one-way hash
Pregunta 14
Pregunta
Using alternate data streams negatively impacts the file.
Pregunta 15
Pregunta
What type of encryption does NTLM use?
Respuesta
-
a. Symmetric
-
b. Asymmetric
-
c. One-way hash
Pregunta 16
Pregunta
How can an MD5 hash be cracked?
Respuesta
-
a. Brute-force attack
-
b. Rainbow table attack
-
c. Dictionary attack
Pregunta 17
Pregunta
For what purpose is the pass-the-hash technique used?
Pregunta 18
Pregunta
How can password guessing be prevented?
Pregunta 19
Pregunta
Which of the following operating systems employs Kerberos authentication?
Respuesta
-
a. Windows 2000
-
b. Windows NT SP3
-
c. Windows 98
Pregunta 20
Pregunta
Which of the following is not true about Certification Authority?
Respuesta
-
a. It is a third party that issues digital certificates
-
b. It is a third party that encrypts information for people
-
c. CA validates the identity of the certificate holder
Pregunta 21
Pregunta
Which of the following are rootkit functionalities?
Respuesta
-
a. To hide OS processes
-
b. To elevate the privileges of processes
-
c. To hide files or registry entries
-
d. To delete or audit logs
-
e. All of the above
Pregunta 22
Pregunta
Which process stage does not verify or try to exploit the vulnerability, just lists and ranks the identified weaknesses?
Pregunta 23
Pregunta
How can rootkits be prevented?
Respuesta
-
a. By using updated antivirus
-
b. By using anti-rootkits
-
c. By reinstalling the operating system
Pregunta 24
Pregunta
Which is the strongest password among these?
Respuesta
-
a. Password
-
b. Airplane
-
c. P@5S\/\/OrD
Pregunta 25
Pregunta
What is the maximum length of a LanMan Hash?
Pregunta 26
Pregunta
Which is a non-technical type of social engineering attack?
Pregunta 27
Pregunta
What is the correct order of the challenge-response process of Windows authentication?
Respuesta
-
a. Response, login request, result, challenge
-
b. Challenge, login request, response, result
-
c. Login request, challenge, response, result
-
d. Result, challenge, login request, response
Pregunta 28
Pregunta
What is needed to successfully crack an FTP password?
Respuesta
-
a. A good word list
-
b. A Windows system
-
c. Syskey
Pregunta 29
Pregunta
What is a good password policy to implement in an organization?
Respuesta
-
a. Do not use old passwords
-
b. Change your passwords every 2 weeks
-
c. Do not use a dictionary word
-
d. All of these
Pregunta 30
Pregunta
In which file are Windows passwords stored?
Respuesta
-
a. Boot.ini file
-
b. SAM file
-
c. Hosts file
-
d. None of these
Pregunta 31
Pregunta
Which tool can be used to crack a Windows password protected with Syskey?
Respuesta
-
a. BKhive
-
b. Cain and Abel
-
c. LC4
Pregunta 32
Pregunta
Which is the best hardware to crack a password?
Pregunta 33
Pregunta
What type of password hash is this: 2ea886556a3a225a18bf4bcc425486db ?
Pregunta 34
Pregunta
Which of these is not a countermeasure against attacks?
Respuesta
-
a. Use self-encrypting drives
-
b. Disable the storage of the LM hash
-
c. Disable the LM authentication
-
d. None of these
Pregunta 35
Pregunta
Which tools can be used to sniff traffic on a network?
Respuesta
-
a. L0phtcrack
-
b. Cain and Abel
-
c. TSGrinder
Pregunta 36
Pregunta
How can LM hash storage be disabled?
Pregunta 37
Pregunta
What type of authentication protocols does Windows support?
Respuesta
-
a. LM
-
b. NTLM
-
c. NTLMv2
-
d. All of these
Pregunta 38
Pregunta
Which of the following are tools that can be used to extract hidden data using steganography?
Respuesta
-
a. Stegdetect
-
b. Cain and Abel
-
c. Stream Explorer
Pregunta 39
Pregunta
A hash injection attack is possible due to?
Respuesta
-
a. Network access
-
b. Physical access
-
c. Viruses and backdoors
Pregunta 40
Pregunta
Which utility is used for hash injection attacks?
Respuesta
-
a. Kerbcrack
-
b. NTPASSWD
-
c. iKey 2032
Pregunta 41
Pregunta
Which of the following .exe of a Trojan is executed on a victim machine?
Respuesta
-
a. Builder.exe
-
b. Server.exe
-
c. Client.exe
Pregunta 42
Pregunta
SigCheck is a download offered by Microsoft.
Pregunta 43
Pregunta
Elite wrapper is a tool to :
Pregunta 44
Pregunta
How is Fully Undetectable (FUD) malware created?
Respuesta
-
a. Using .exe wrappers
-
b. Using hex editors
-
c. Using steganography
Pregunta 45
Pregunta
What is a Trojan.FakeAV?
Respuesta
-
a. Malware behaving as an antivirus
-
b. Tool to detect malware
-
c. Tool to make FUD malware
Pregunta 46
Pregunta
Which is a ransomware?
Respuesta
-
a. Trojan
-
b. Virus
-
c. Worm
Pregunta 47
Pregunta
What is the effect of SMS Trojans?
Pregunta 48
Pregunta
What is email harvesting?
Pregunta 49
Pregunta
What is the full form of UDP?
Pregunta 50
Pregunta
Identify the spyware.
Pregunta 51
Pregunta
Pick the non-legitimate software.
Pregunta 52
Pregunta
How does a virus spread between computers?
Pregunta 53
Pregunta
Spyware are malicious programs that, after downloading themselves on a PC, begin to transmit some type of information through the Internet, except:
Pregunta 54
Pregunta
Which is not a method of spyware distribution?
Pregunta 55
Pregunta
What is the common IANA registered Port for Kerberos?
Respuesta
-
a. UDP Port 123
-
b. TCP Port 119
-
c. UDP Port 161
-
d. TCP Port 88
Pregunta 56
Pregunta
Which type of keylogger remains undetected by both antispyware and antivirus programs?
Respuesta
-
a. Hardware Keylogger
-
b. Software Keylogger
Pregunta 57
Pregunta
A program designed to trace every keystroke on the machine on which it is installed to steal the personal information of the user is called a:
Respuesta
-
a. Virus
-
b. Keylogger
-
c. Worm
-
d. Trojan
Pregunta 58
Pregunta
Spyware is a program that runs in stealth mode. What is this program otherwise called that gathers and records sensitive information available on your PC?
Respuesta
-
a. Virus
-
b. Spybot
-
c. Cookies
Pregunta 59
Pregunta
Pick the odd one out.
Pregunta 60
Pregunta
SetWindowsHookEx() is a Windows function used by:
Respuesta
-
a. Software keyloggers
-
b. Hardware keyloggers
Pregunta 61
Pregunta
The memory injection-based keyloggers can alter while patching the memory table of your PC and browser, and help the hackers gain control over your personal data. An example of Trojans that use memory injection-based keyloggers is:
Respuesta
-
a. Hyper-V
-
b. API
-
c. Zeus
-
d. Ultimate Keylogger
Pregunta 62
Pregunta
What is not true about Social Engineering?
Respuesta
-
a. It uses social tactics to gain information.
-
b. It uses high-end technologies.
-
c. Exploits the trust of the victims.
Pregunta 63
Pregunta
Select all the countermeasures that can keep you safe from spyware and keyloggers.
Respuesta
-
a. Expensive antivirus
-
b. Use of a firewall
-
c. KeyScrambler
-
d. Use of freeware
Pregunta 64
Pregunta
The majority of keyloggers are used by hackers to steal people’s confidential information, but there are few exceptions like Amac and:
Respuesta
-
a. Ultimate Keylogger
-
b. Hyper-V
-
c. SpyEye
Pregunta 65
Pregunta
Pick the non-legitimate software.
Pregunta 66
Pregunta
Which of these is the odd one out?
Pregunta 67
Pregunta
Spyware activity can cause the following except:
Pregunta 68
Pregunta
Antivirus and antispyware programs fail to detect kernel-based keyloggers because, they . (Select all that apply.)
Pregunta 69
Pregunta
Though hackers are always a step ahead, even sophisticated spyware programs cannot:
Pregunta 70
Pregunta
It is safe to install all search engine toolbars?
Pregunta 71
Pregunta
Identify the hardware keyloggers.
Respuesta
-
a. Form grabbing
-
b. Wireless keyloggers
-
c. API
-
d. Keyboard overlays
Pregunta 72
Pregunta
Which of the following, when installed on a PC, can include a kernel-based keylogger?
Respuesta
-
a. Trojans
-
b. Rootkits
-
c. Drive-by downloads
Pregunta 73
Pregunta
The following steps can help you stay protected, except :
Pregunta 74
Pregunta
Select all the programs that will protect your PC.
Respuesta
-
a. KeyScrambler
-
b. HiJackThis
-
c. Torrent
-
d. Comodo
Pregunta 75
Pregunta
Almost all programs contain spyware code.
Pregunta 76
Pregunta
Antivirus software is spyware.
Pregunta 77
Pregunta
There is a difference between legitimate tracking software and spyware.
Pregunta 78
Pregunta
When you visit some websites, you will get a popup asking you to install ActiveX or a similar plug-in. This is known as a drive-by download.
Pregunta 79
Pregunta
The keylogger works in combination with spyware and cannot be programmed to start and end when the user is prompted to enter a username and password in any browser window.
Pregunta 80
Pregunta
Antivirus and antispyware programs can detect the data stored in the hardware keyloggers?
Pregunta 81
Pregunta
Zeus can alter the memory table that is associated with your browser and control the logging functions.
Pregunta 82
Pregunta
Amac is a keylogger designed for the Windows operating system.
Pregunta 83
Pregunta
Keyloggers run at ring 0.
Pregunta 84
Pregunta
Built-in firewalls are easy to turn off.
Pregunta 85
Pregunta
What is a Netcat?
Respuesta
-
a. Network port scanner
-
b. Virus
-
c. Trojan
Pregunta 86
Pregunta
Which tool is used to replace the .exe icon?
Respuesta
-
a. Exe icon
-
b. Netcat
-
c. Sandbox
Pregunta 87
Pregunta
The pattern that can be used to identify a virus is known as:
Respuesta
-
a. Stealth
-
b. Virus signature
-
c. Armoured
Pregunta 88
Pregunta
Which one of the following is not an attack, but a search for vulnerabilities to attack?
Respuesta
-
a. Denial-of-service
-
b. Port scanning
-
c. Dumpster diving
Pregunta 89
Pregunta
Which one can’t spread viruses?
Pregunta 90
Pregunta
Programs that come into a computer system disguised as something else are called:
Respuesta
-
a. Spoofers
-
b. Loggers
-
c. Trojans
Pregunta 91
Pregunta
Nmap stands for?
Respuesta
-
a. Network Mapper
-
b. NetBIOS Mapper
-
c. Network Map
Pregunta 92
Pregunta
Which is the best way to test or analyse malware?
Pregunta 93
Pregunta
Which is a function of Nmap?
Respuesta
-
a. Virus detection
-
b. Malware removal
-
c. Network scanning
Pregunta 94
Pregunta
What is the name of a hardware-based malware detection tool?
Respuesta
-
a. Adaptive DarkNet
-
b. Dr.Web
-
c. McAfee
Pregunta 95
Pregunta
How can malware infection be cured?
Pregunta 96
Pregunta
What is a Trojan-Game Thief?
Pregunta 97
Pregunta
Which step is essential for the organization to be compliant with certain ISOs or other certification bodies?
Pregunta 98
Pregunta
You may give someone your password if:
Respuesta
-
a. It is never OK to give out your password
-
b. Your boss asks you for your password
-
c. The Helpdesk asks you for your password
-
d. you send it by e‐mail and change it soon afterwards
Pregunta 99
Pregunta
Find the odd one out.
Respuesta
-
a. ECB
-
b. CBC
-
c. PKC
-
d. OFB
Pregunta 100
Pregunta
Pick the wrong statement(s) about Encryption.
Respuesta
-
a. It is an irreversible process.
-
b. It can be used to prove the identity of a person.
-
c. Non-repudiation is ensured.
-
d. It cannot ensure the integrity of data.