0% found this document useful (0 votes)
114 views

Chapter 2 Test Questions True/False

1. The document contains a chapter 2 test with true/false and multiple choice questions about cybersecurity topics like the attacker methodology, OSI model, and TCP/IP protocol stack. 2. The questions cover various stages of the attacker methodology, layers of the OSI model, protocols of the TCP/IP stack like IP, TCP, UDP, and ICMP, and cyberattacks like session hijacking and teardropping. 3. The test also includes questions about ethical hacking, intrusion detection systems, and protocols like FTP, SMTP, DNS, and their roles.

Uploaded by

adnan Mengal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views

Chapter 2 Test Questions True/False

1. The document contains a chapter 2 test with true/false and multiple choice questions about cybersecurity topics like the attacker methodology, OSI model, and TCP/IP protocol stack. 2. The questions cover various stages of the attacker methodology, layers of the OSI model, protocols of the TCP/IP stack like IP, TCP, UDP, and ICMP, and cyberattacks like session hijacking and teardropping. 3. The test also includes questions about ethical hacking, intrusion detection systems, and protocols like FTP, SMTP, DNS, and their roles.

Uploaded by

adnan Mengal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Chapter 2 Test Questions

True/False

1. Attackers follow a fixed methodology that could be divided in four steps.


ANS: False. Attackers follow a fixed methodology that could be divided in six steps.

2. The Internet is a great source of information that attackers can use to do reconnaissance of the
target.
ANS: True

3. One of the techniques an attacker could use to cover his tracks is to delete or change the log
files.
ANS: True

4. Because reconnaissance is passive in nature, if it is done correctly the victim will never know it is
occurring.
ANS: True

5. Scanning and enumeration are the first step in the attacker’s methodology.
ANS: False. Scanning and enumeration are the second step in the attacker’s methodology.

6. If the organization employs the Deny All rule, the hacker’s effectiveness could be reduced.
ANS: True

7. An ethical hacker follows a similar process as the attacker and does not care if harm is done to
the company network during the process.
ANS: False. An ethical hacker follows a similar process as the attacker but strives to do no harm
to the company network during the process.

8. The methodology used to secure an organization can be divided into five steps.
ANS: True

9. The OSI model has four layers.


ANS: False. The OSI model has seven layers.

10. Although there are many protocols in the TCP/IP stack, the following four are considered the
core: IP, TCP/IP, UDP, and ICMP.
ANS: True
Multiple Choice

1. Dumpster diving, social engineering, and Internet searches are some of the activities that take
place in the following step of the attacker’s methodology.
a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege

ANS: A

2. What is used to gather in-depth information about the target such as user accounts and open
shares?
a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege

ANS: B

3. Accessing an open wireless connection or exploiting a vulnerability on a server is some of the


activities that take place in the following step of the attacker’s methodology.
a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege

ANS: C

4. Which OSI layer is responsible for encryption and decryption of data?


a. Application
b. Presentation
c. Session
d. Network
ANS: B

5. Which OSI layer is responsible for the logical addressing and routing of the packets?
a. Application
b. Presentation
c. Session
d. Network

ANS: D

6. Which OSI layer is responsible for establishing the TCP connection and is vulnerable to session
hijacking attacks?
a. Application
b. Presentation
c. Session
d. Network

ANS: C

7. Which of the following is not one of the layers of the TCP/IP protocol stack?
a. Application
b. Host-to-host
c. Transmission
d. Internet

ANS: C

8. Which of the following protocols is not part of the application layer?


a. TCP
b. HTTP
c. FTP
d. DNS

ANS: A

9. What is a type of attack that exploits overlapping IP fragments and can affect older systems such
as Windows 95, NT, and 3.1?
a. Session hijack attack
b. Teardrop attack
c. Nimba worm attack
d. DSN cache poisoning attack
ANS: B

10. Spoofing and spamming are two of the vulnerabilities associated with which of the following
protocol?
a. HTTP
b. FTP
c. SMTP
d. TFTP

ANS: C

11. Which protocol is responsible for addressing and routing the data?
a. TCP
b. IP
c. UDP
d. ICMP

ANS: B

12. Which protocol is used for diagnostics and provides error messages?
a. TCP
b. IP
c. UDP
d. ICMP

ANS: D

13. Which of the following TCP/IP layers is responsible for the physical delivery of IP packets via
frames?
a. Network access Layer
b. Internet layer
c. Host-to-host layer
d. Application layer

ANS: A

14. Which of the following is not one of the flags used in the TCP three-step handshake?
a. SYN
b. PSH
c. SYN ACK
d. ACK

ANS: B

15. Internet Protocol (IP) and Internet Control Message Protocol (ICMP) are part of what TCP/IP
layer?
a. Network access layer
b. Internet layer
c. Host-to-host layer
d. Application layer

ANS: B

Matching:

A. Set of tools used to help the attacker maintain access to the system
B. Active step of attempting to connect to a system and get a response
C. A system that could be used to detect an attack
D. A protocol that operates on ports 20 and 21 and is the most commonly used by hacker
services
E. A TCP/IP layer responsible for end-to-end delivery
F. A TCP/IP layer responsible for application support
G. An application that operates on port 53 and resides at the application layer of the TCP/IP
protocol stack
H. A protocol responsible for resolving IP addresses to MAC addresses
I. A protocol that is responsible for establishing a connection between two hosts by using a
three-step handshake process
J. A protocol that is best suited for quick delivery of nonsensitive data

a. Rootkit
b. Scanning
c. Intrusion Detection System (IDS)
d. FTP
e. Host-to-Host Layer
f. Application Layer
g. DNS
h. ARP
i. TCP
j. UDP

You might also like