Eti Assign 3
Eti Assign 3
ASSIGNMENT NO 3
CHAPTER 5
C. Encryption.
D. None of these.
A. Nmap
B. LC4
C. ToneLOC
D. Nessus
Q3. ______ is the art of exploiting the human elements to gain access to the authorized user.
A. Social Engineering.
B. IT Engineering.
C. Ethical Hacking.
A. Strengths.
B. Weakness.
C. A & B
D. None of these.
A. G. Palma.
B. Raymond.
C. Either.
D. Jhon Browman.
A. Entries.
B. Checklists.
C. Both A & B
Q7. .______ comprise of large portion of hacker attacks simply because every computer has
one and so well know exploits can be used against them
A. Nontechnical attacks
Q8. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
A. stealing
B. disclosure
C. deleting
D. hacking
Q9. Leaking your company data to the outside network without prior permission of senior
authority is a crime.
A. True
B. False
A. 2600
B. Hackin9
C. PHRACK
Q11. Which hacker try to distribute political or social message through their work?
B. Hactivist
C. Script kiddes
A. Whisker
B. Super scan
C. Nikto
D. Kismet
Q13. _____ should be done before ethical hacking process.
A. Data gathering.
B. Attacking
C. Planning
D. Research
Q14. Ethical hacking will allow to____ all the massive security breaches.
A. Remove.
B. Measure.
C. Reject.
D. None of these.
A. Fame.
B. Profit.
C. Revenge.
Q16. A penetration tester must identify and keep in mind the ___________ & ___________
requirements of a firm while evaluating the security postures.
C. hacking techniques
A. Written permission.
C. Privacy permission
D. Risk permission.
A. Police
B. Forensics
C. Thief
D. Hacker
Q20. Keeping information secured can protect an organization image and save and organization
lot of money
A. True
B. False
Q21. Ethical hacking consist of _______
A. Penetration testing.
B. Intrusion testing.
C. Red teaming.
A. Maintaining Access.
B. Reconnaissance
C. Scanning.
D. Gaining Access.
A. B, C, D, A
B. B, A, C, D
C. A, B, C, D
D. D, C, B, A
Q23. Computer Hackers have been in existence for more than a____.
A. Decade.
B. Year.
C. Century
D. Era.
Q24. .Connecting into network through a rogue modem attached to computer behind a firewall
is an example of ____-
A. Nontechnical attacks
Q26. Network consist devices such as routers, firewalls, hosts that you must assess as a part of
______ process.
A. Prackers
B. ARP poisoning
C. session hijacking
D. MAC spoofing
A. Connection Attack
Q30. Which tool is used for ping sweeps and port scanning?
A. Netcat
B. SamSpade
C. SuperScan
A. Spyware
B. Shoulder surfing
C. Trojan
D. Social engineering
A. Availability
B. Confidentiality
C. Integrity
D. Authentication
A. 22
B. 80
C. 20
D. 23
A. Reconnaissance
B. Maintaining Access
C. Scanning
D. Gaining Access
A. Passive stack
B. Active stack
D. Scanned
C. connection analysis
A. Spamming
B. Identify Theft
C. Impersonation
D. Scanning
A. Man-in-the-Middle attack
B. Denial-of-Service attack
C. Sniffing
D. Spoofing
A. Attack syllable
C. Attacks hybrid
Q44. Which type of hacker represents the highest risk to your network?
A. black-hat hackers
B. grey-hat hackers
C. script kiddies
D. disgruntled employees
Q45. _________ is not a function of network analyzer tool.
D. Banner grabbing
Q46. We can eliminate many well-known network vulnerabilities by simply patch-ing your
network hosts with their latest ______and______.
D. None of above
A. Hacking
B. Evidence
C. Tracing
D. None of above
D. None of above
Q49. Who invent worm attack___
A. Brightn Godfrey
B. Alan yeung
C. Robert Morris
D. None of above
Q50. ____ include phishing, SQL injection, hacking, social engineering, spamming, denial of
service attacks, Trojans, virus and worm attacks.
B. Web vulnerabilities