Copy of TYCS(EH)
Copy of TYCS(EH)
8. What is a honeypot?
a) A device used to lure attackers into a trap
b) A type of malware that spreads through a network
c) A tool used to test network performance
d) A device used to monitor network traffic
a) Brute force
b) Cross-site scripting
c) SQL injection
d) Denial of Service
a) Smurf attack
b) SQL injection
c) Cross-site scripting
d) Port scanning
a) Port scanning
b) Ping sweep
c) Banner grabbing
d) Sniffing
20. Which of the following is a technique used to prevent a buffer overflow attack?
a) Input validation
b) Brute force attack
c) Man-in-the-middle attack
d) Social engineering attack
a) Fuzz testing
b) Penetration testing
c) Vulnerability scanning
d) Source code review
22. Which of the following is NOT a common method used for social engineering
attacks?
A) Pretexting
B) Phishing
C) Vishing
D) Port Scanning
23. Which of the following is a common technique used by attackers to exploit buffer
overflow vulnerabilities?
a) Cross-site scripting
b) SQL injection
c) DNS spoofing
d) Shellcode injection
24. Which of the following is a passive reconnaissance technique used in ethical hacking?
a) Port Scanning
b) Social Engineering
c) Sniffing
d) SQL Injection
a) Metasploit
b) Nmap
c) Wireshark
d) Cain & Abel
a) Encryption
b) Firewall
c) DMZ
d) VLAN