Ethical Hacking Questions

Basic Ethical Hacking Questions

1.Which of the following is not an effective countermeasure against replay attack ?
     A. Digital Signatures
     B. Time stamps
     C. System Identification
     D. Sequence numbers

2.According to CHE methodology What is the next step to be performed after foot printing ?
     A. Enumeration
     B. Scanning
     C. System Hacking
     D. All of the above

3.Which of the following tools are used for enumeration?
     A. USET2ID
     B. SID2USER
     C. DumpSec
     D. All of the above

4.Consumer relies on provider to ensure for
A. Data security and privacy
B. Resource availability
C. Monitoring and repairing of services/resources
D. All of the above.

5.Which is the true cloud computing governance model if we implement PaaS
A. Vendor has control over application, services, server, storage and network
B. Organization has control over application, services, server, storage & network
C. Organization & vendor shares control over application, services, server, storage & network
D. Vendor has control over server, storage and network

6. Which of the following tools can an attacker use for almost all footprinting needs, including whois, HTTP banner grabbing, and traceroutes?
1, Google Earth
2.Sam spade
3.My IP suite
4.Neotrace

7. Which of the following types of hosts are placed on a network to attract the attention of a malicious attacker and allow the administrator to observe their actions ?
A. Bastion host
B. Honeypot
C. Intrusion detection system
D. A windows 98 machine

8.What does the following command achieve ?
     Telnet
     HEAD/HTTP/1.0
A. This command returns the home page for the IP Address specified
B. This command open a backdoor telnet address specified
C. This command returns the banner of the website specified by IP Address.
D. This command allows a hacker to determine the sites security.

No comments:

Post a Comment