TEST3
![]() |
![]() |
![]() |
Título del Test:![]() TEST3 Descripción: ESCUELA3 |




Comentarios |
---|
NO HAY REGISTROS |
Which of the following networks relies on the tunneling protocol?. Wide Area Network (WAN). Virtual Private Network (VPN). Local Area Network (LAN). Wireless Network. Maria works as a Security Administrator for NetPerfect Inc. The company has a Windows-based network. Maria wants to ensure that the Sales executives of the company are able to surf the Internet only through a secure URL. Which of the following protocols provides a secure connection to the Internet?. FTP. HTTPS. HTTP. WAP. Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends large number of unsolicited commercial e-mail (UCE) messages on these addresses. Which of the following e-mail crimes is Peter committing?. E-mail bombing. E-mail spoofing. E-mail Spam. E-mail Storm. Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?. gaining access. Preparation. Reconnaissance. Scanning. Which of the following is a valid IP address for class B Networks?. 225.128.98.7. 212.136.45.8. 80.33.5.7. 172.157.88.3. Which of the following processes is used by hackers to find information about the target system?. Banner grabbing. Cracking. Covering tracks. Footprinting. Which of the following types of attacks cannot be prevented by technical measures only?. Brute force. Ping flood attack. Smurf DoS. Social engineering. Which of the following is used in asymmetric encryption?. Public key and user key. SSL. Public key and private key. NTFS. Which of the following OSI layers is used by routers?. Application layer. Network layer. Physical layer. Transport layer. Which of the following password cracking attacks does not use any software for cracking e-mail passwords?. Brute force attack. Shoulder surfing. Social engineering. Hybrid attack. You work as a Sales Manager for NetPerfect Inc. The company has a Windows-based network. You have to often send confidential e-mails and make online payments and purchases. You want to protect transmitted information and also to increase the security of e-mail communications. Which of the following programs or services will you use to accomplish the task?. Hashcat. John the Ripper. THC Hydra. Pretty Good Privacy (PGP). Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?. Steganography. Public-key cryptography. Encryption. RSA algorithm. John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers. Which system is John using to track the malicious hackers?. Honeypot. Intrusion Detection System (IDS). Bastion host. Honeytokens. Which of the following password cracking attacks is implemented by creating tables of hashes for a set of characters?. Rainbow attack. Brute force attack. SQL injection attack. Dictionary attack. Which of the following statements explains the dumpster diving hacking technique?. This is an information gathering technique in which the attacker runs a software program to automatically call thousands of telephone numbers to find out a victim who has attached a modem to the Internet. This is an information gathering technique in which an attacker rummages through all the discarded waste-papers in the victim's trash. This is an information gathering technique in which the attacker calls the help center of the organization and asks someone to reset a password. This is an information gathering technique in which the attacker injects a Trojan in the victim's computer. In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?. Fraggle. Jolt. Teardrop. Ping of death. Which of the following programs is used to monitor the keystrokes that a user types on a specific computer's keyboard?. Keylogger. Brutus. Ettercap. THC-Hydra. A ________ attack is designed to bring loss of network connectivity and services by consuming the bandwidth of a user's network. Dictionary. Brute force. Man-in-the-middle. Denial of Service (DoS). Which of the following malicious codes is used by a hacker to get control over the system files of a victim?. Worm. Multipartite virus. Macro viru. Trojan. Which of the following terms is used for the process of securing a system or a device on a network infrastructure?. Hardening. Authentication. Cryptography. Sanitization. |