Ethical Hacker

Question 1 of 45

Medal-premium 1

A __________ modifies its own code to elude detection.

Select one of the following:

  • Compression virus

  • Boot sector virus

  • Stealth virus

  • Self-garbing virus

Question 2 of 45

Medal-premium 1

__________: A process that database designers go through to eliminate redundant data, repeating groups and attributes.

Select one of the following:

  • Data normalization

  • SQL

Question 3 of 45

Medal-premium 1

__________: Data manipulation and relational database definition language.

Select one of the following:

  • Data normalization

  • SQL

Question 4 of 45

Medal-premium 1

__________ stands for push data bit used to signify that data in this packet should be put at the beginning of the queue of data to be processed.

Select one of the following:

  • ACK

  • FIN

  • URG

  • PSH

Question 5 of 45

Medal-premium 1

A __________ can reproduce on their own which is different from viruses and self-contained programs.

Select one of the following:

  • Worms

  • Logic Bomb

  • Trojan Horse

Question 6 of 45

Medal-premium 1

__________ are shopping carts, CMS driven sites, and the level at which the user interfaces.

Select one of the following:

  • Application Levels

  • Middleware Levels

  • Operating System Levels

  • Hardware Levels

Question 7 of 45

Medal-premium 1

__________ are database and work between the Operating system and Application level.

Select one of the following:

  • Application Levels

  • Middleware Levels

  • Operating System Levels

  • Hardware Levels

Question 8 of 45

Medal-premium 1

__________ are Linux and Windows.

Select one of the following:

  • Application Levels

  • Middleware Levels

  • Operating System Levels

  • Hardware Levels

Question 9 of 45

Medal-premium 1

True or False. Users peform day-to-day tasks that support the overall security program.

Select one of the following:

  • True
  • False

Question 10 of 45

Medal-premium 1

__________ are retina scan, fingerprint and voice print.

Select one of the following:

  • Biometrics

  • Token Devices

  • Memory Cards

  • Smart Cards

Question 11 of 45

Medal-premium 1

IP, ICMP, RIP, IGMP, and IPX are protocols found at which layer of the OSI Model?

Select one of the following:

  • Session Layer

  • Transport Layer

  • Network Layer

  • Data Link Layer

Question 12 of 45

Medal-premium 1

SLIP, PPP, ARP, RARP, L2F, and L2TP are protocols found at which layer of the OSI Model?

Select one of the following:

  • Session Layer

  • Transport Layer

  • Network Layer

  • Data Link Layer

Question 13 of 45

Medal-premium 1

High-speed Serial Interface (HSSI), H.21, EIA/TIA-232, and EIA/TIA-449 are protocols found at which layer of the OSI Model?

Select one of the following:

  • Session Layer

  • Transport Layer

  • Physical Layer

  • Data Link Layer

Question 14 of 45

Medal-premium 1

ASCII, TIFF, GIF, JPEG, MPEG, MIDI, MIME are protocols found at which layer of the OSI Model?

Select one of the following:

  • Application Layer

  • Presentation Layer

  • Session Layer

  • Transport Layer

Question 15 of 45

Medal-premium 1

NetBIOS, NFS, SQL, and RPC are protocols found at which layer of the OSI Model?

Select one of the following:

  • Presentation Layer

  • Session Layer

  • Transport Layer

  • Network Layer

Question 16 of 45

Medal-premium 1

__________ is when two keys generate the same cipher text from the same plain text.

Select one of the following:

  • Cryptanalysis

  • Cryptology

  • Key Clustering

  • Cipher

Question 17 of 45

Medal-premium 1

True or False. A hash is a process to create a unique string of characters from any data source – password or executable.

Select one of the following:

  • True
  • False

Question 18 of 45

Medal-premium 1

True or False. A hash collision is when two distinct data sources are input into a hashing function, which then produce identical outputs.

Select one of the following:

  • True
  • False

Question 19 of 45

Medal-premium 1

__________ is the science of studying and breaking encryption mechanisms

Select one of the following:

  • Cryptography

  • Cipher

  • Cryptographic Algorithm

  • Cryptanalysis

Question 20 of 45

Medal-premium 1

__________ is the study of cryptography and cryptanalysis

Select one of the following:

  • Cryptanalysis

  • Cryptology

  • Key Clustering

  • Cipher

Question 21 of 45

Medal-premium 1

__________ is the probability that a threat will exploit a vulnerability to adversely affect an information asset.

Select one of the following:

  • Risk

  • Threat

  • Treat Impact

  • Threat probability

Question 22 of 45

Medal-premium 1

__________ is an event, the occurrence of which could have an undesired impart

Select one of the following:

  • Risk

  • Threat

  • Treat Impact

  • Threat probability

Question 23 of 45

Medal-premium 1

. __________ is a measure of the magnitude of loss or harm on the value of an asset.

Select one of the following:

  • Risk

  • Threat

  • Treat Impact

  • Threat probability

Question 24 of 45

Medal-premium 1

__________ is the chance that an event will occur or that specific loss value may be attained should the event occur.

Select one of the following:

  • Risk

  • Threat

  • Treat Impact

  • Threat probability

Question 25 of 45

Medal-premium 1

__________ is a risk-reducing measure that acts to detect, prevent, and minimize loss associated with the occurrence of a specified threat or category of threats.

Select one of the following:

  • Risk

  • Safeguard

  • Treat Impact

  • Threat probability

Question 26 of 45

Medal-premium 1

True or False. Passive reconnaissance is the process of collecting information about an intended target by making contact with the target through Social Engineering or Electronic probing of the target system.

Select one of the following:

  • True
  • False

Question 27 of 45

Medal-premium 1

True or False. Active reconnaissance is the process of collecting information about an intended target without direct contact with the target.

Select one of the following:

  • True
  • False

Question 28 of 45

Medal-premium 1

True or False. Authority is where attackers pose as victim’s boss, boss’s secretary, or other company personnel.

Select one of the following:

  • True
  • False

Question 29 of 45

Medal-premium 1

True or False. Strong emotion gets victims into heightened emotional state so they don’t pay as much attention to the details/facts.

Select one of the following:

  • True
  • False

Question 30 of 45

Medal-premium 1

True or False. Overloading provides more information than target can handle so wrong statements go unnoticed also known as ‘Double Talk’.

Select one of the following:

  • True
  • False

Question 31 of 45

Medal-premium 1

__________ inserts the torque wrench and apply a turning pressure to the cylinder. The first pin will ‘bind’ against the hull. Attempt to raise the binding pin until the cylinder rotates slightly.

Select one of the following:

  • Binding Pin

  • Binding

  • Binding Order

  • Raking

Question 32 of 45

Medal-premium 1

__________ is when the binding pin is at the sheer line, the cylinder will rotate slightly. The next pin will now bind. Repeat the process until all pins are at the sheer line. Be careful not to push the pin too far into the hull. This will bind the key pin and prevent the cylinder from rotating. To resolve this, torque must be released to drop the pin.

Select one of the following:

  • Binding Pin

  • Binding

  • Binding Order

  • Raking

Question 33 of 45

Medal-premium 1

__________ is the order in which the pins bind is different for each lock type. It depends on the manufacturing process and the lateral position of the pins.

Select one of the following:

  • Binding Pin

  • Binding

  • Binding Order

  • Raking

Question 34 of 45

Medal-premium 1

__________ is at home you can take your time picking a lock, but in the field, speed is always essential. A lock picking technique called raking can quickly open most locks. Basically, you use the pick to rake back and forth over the pins while you adjust the amount of torque on the plug.

Select one of the following:

  • Binding Pin

  • Binding

  • Binding Order

  • Raking

Question 35 of 45

Medal-premium 1

__________ is done by inserting a thin, strong, ‘credit card’ shaped object between the door and the frame, you can force the locking wedge into the lock.

Select one of the following:

  • Binding Pin

  • Binding

  • Shimming Door Locks

  • Raking

Question 36 of 45

Medal-premium 1

__________ creates an encrypted virtual tunnel between your computer and one of our high bandwidth security proxy servers. This tunnel shields you from the most sophisticated methods of online spying and snooping.

Select one of the following:

  • SecurSURF

  • RoboForm

  • Thunderbird

  • Hushmail

Question 37 of 45

Medal-premium 1

__________ is User ID/password management application.

Select one of the following:

  • SecurSURF

  • RoboForm

  • Thunderbird

  • Hushmail

Question 38 of 45

Medal-premium 1

__________ is portable E-mail access

Select one of the following:

  • SecurSURF

  • RoboForm

  • Thunderbird

  • Hushmail

Question 39 of 45

Medal-premium 1

__________ is a Web based email solution.

Select one of the following:

  • SecurSURF

  • RoboForm

  • Thunderbird

  • Hushmail

Question 40 of 45

Medal-premium 1

True or False. TOR is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet

Select one of the following:

  • True
  • False

Question 41 of 45

Medal-premium 1

True or False. A buffer overflow condition exists when a program attempts to put more data in a buffer than it can hold or when a program attempts to put data in a memory area past a buffer.

Select one of the following:

  • True
  • False

Question 42 of 45

Medal-premium 1

True or False. When a programmer writes a piece of software that will accept data, a variable has to be constructed to hold it.

Select one of the following:

  • True
  • False

Question 43 of 45

Medal-premium 1

True or False. The programmer does not have to allocate this memory space, which is referred to as a buffer.

Select one of the following:

  • True
  • False

Question 44 of 45

Medal-premium 1

True or False. A buffer is a contiguous segment of memory that holds several instances of the same type of data.

Select one of the following:

  • True
  • False

Question 45 of 45

Medal-premium 1

True or False. When a Web browser requests a Web page from a server it sends over an HTTP Request command.

Select one of the following:

  • True
  • False
Icon_fullscreen

Ethical Hacker

k-sita_eunice
Quiz by , created over 1 year ago

Para realizar la certificacion de ethical Hacker

Eye 43
Pin 0
Balloon-left 0
k-sita_eunice
Created by k-sita_eunice over 1 year ago
Close