0% found this document useful (0 votes)
99 views9 pages

unit 6 eti

The document consists of a series of multiple-choice questions related to types of hacking and network security tools. It covers various topics including network scanning tools, protocols like FTP and SMTP, and types of attacks such as email bombs and ARP spoofing. The questions are designed to test knowledge on ethical hacking practices and network security concepts.

Uploaded by

Tanishq Jagtap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views9 pages

unit 6 eti

The document consists of a series of multiple-choice questions related to types of hacking and network security tools. It covers various topics including network scanning tools, protocols like FTP and SMTP, and types of attacks such as email bombs and ARP spoofing. The questions are designed to test knowledge on ethical hacking practices and network security concepts.

Uploaded by

Tanishq Jagtap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Unit 6- Types of Hacking

1) ___ used for windows for network queries from DNS lookups to trace routes.
a. Sam Spade
b. Super Scan
c. NetScan
d. Nmap

2) ___ used for ping sweep & port scanning.


a. Sam Spade
b. Super Scan
c. Net Scan
d. Nmap

3) ___ tools Pro for dozens of network security-assessment functions, including ping sweeps, port
scanning, and SMTP relay testing.
a. Sam Spade
b. Super Scan
c. NetScan
d. Nmap

4) ____ used as a happy-clicky-GUI front end for host-port probing and operating system fingerprinting.
a. Sam Spade
b. Super Scan
c. NetScan
d. Nmap or NMapWin

5) ____ is the most versatile security tool for such security checks as port scanning and firewall testing. a.
NetScan
b. Nmap or NMapWin
c. Netcat
d. WildPacketsEtherPeek

6) ___ is used for network analysis.


a. NetScan
b. Nmap or NMapWin
c. Netcat
d. WildPacketsEtherPeek

7) Which software tool is used to scan the network to see who’s there and provide basic views of how the
network is laid out?
a. Port Scanner
b. Ping Sweeping
c. SNMP Scanning
d. Banner Grabbing
8) As an ethical hacker, you should scan all ____ ports on each network host that’s found by your scanner.
a. 6346 TCP and 6347 UDP
b. 27665 TCP and 31335 UDP
c. 65,535 TCP and 65,535 UDP
d. 1434 TCP and 1434 UDP

9) FTP stands for ___


a. File Transport Protocol
b. File Transfer Protocol
c. File Tracing Protocol
d. None of the above

10) SMTP stands for___


a. Simple Mail Transport Protocol
b. Simple Management Transfer Protocol
c. Simple Mail Transfer Protocol
d. Simple Management Transport Protocol

11) DNS stands for ____


a. Domain Name Service
b. Domain Name System
c. Data Name Service
d. Data Name System

12) TFTP stands for ____


a. Trivial File Transfer Protocol
b. Trivial File Transport Protocol
c. Thin File Transport Protocol
d. None of the above

13) HTTP stands for____


a. Higher Text Transport Protocol
b. Higher Text Transfer Protocol
c. Hypertext Transfer Protocol
d. Hypertext Transport Protocol

14) SNMP stands for ___


a. Simple Network Messaging Protocol
b. Simple Network Mailing Protocol
c. Simple Network Management Protocol
d. Simple Network Master Protocol
c.
d.

15) IMAP stands for____


a. Internet Mailing Access Protocol
b. Internet Message Access Protocol
Intranet Message Access Protocol
Intranet Mailing Access Protocol

16)In traffic restriction which device is used for inbound traffic?


a. Internal Router
b. Modem
c. Firewall
d. External Router

17) In traffic restriction which device is used for outbound traffic?


a. Internal Router
b. Modem
c. Firewall
d. External Router

18) IDS stands for ___


a. Instruction Detection System
b. Instruction Detection Service
c. Intrusion Detection Service
d. Intrusion Detection System

19) Which tool is used to find out the general network information, such as the number of unique IP
addresses, NetBIOS names and MAC addresses?
a. Nmap
b. Sam Spade
c. NetScanTools Pro
d. None of the above

20) ____ is executed through the searching of multiple hosts in order to target just one specific open port. a.
Port scanning
b. Port sweeping
c. Port searching
d. None of the above

21) _____ is considered a serious threat to one’s PC, as it can occur without producing any outward signs to
the owner that anything dangerous is taking place.
a. Port scanning
b. Port sweeping
c. Port searching
d. None of the above

22) A ___ monitors incoming and outgoing connections through one’s personal computer. a. Router
b. Repeater
c. Firewall
d. Modem

23) ___ tells Nmap to perform a ping scan.


a. sP
b. n
c. –T4
d. 192.168.1.1-254

24) ____ tells Nmap to not perform name resolution.


a. sP
b. n
c. –T4
d. 192.168.1.1-254

25) ___ Option tells Nmap to perform an aggressive (faster) scan.


a. sP
b. n
c. –T4
d. 192.168.1.1-254

26) ____ tells Nmap to scan the entire 192.168.1.x subnet.


a. sP
b. n
c. –T4
d. 192.168.1.1-254

27) If ___ is compromised, a hacker can gather such network information as ARP tables and TCP
connections to attack your systems.
a. ICMP
b. SNMP
c. FTP
d. Banner grabbing

28) ____ is the act of capturing the information provided by banners, configurable text-based welcome
screens from network hosts that generally display system information.
a. ICMP
b. SNMP
c. FTP
c.
d.

d. Banner grabbing

29) Banner grabbing is often used for


a. White hat hacking
b. Black hat hacking
c. Grey hat hacking
d. Script kiddies

30) We can grab banners by using __


a. telnet
b. Netcat
Both a & b
None of the above

31)____ can grab banner information from routers and other network hosts, such as a wireless access point
or managed Ethernet switch.
a. Telnet
b. Netcat
c. Network analyzer
d. None of the above

32) A ___ is a tool that allows you to look into a network and analyze data going across the wire for
network optimization, security, and/or troubleshooting purposes.
a. Telnet
b. Netcat
c. Network analyzer
d. None of the above

33) Network analyzer are often generically referred to as ___


a. Attacker
b. Intruder
c. Sniffer
d. Hacker

34) EtherPeek by WildPackets network analyzer tools supports ____ operating system. a. Windows
b. Windows and UNIX
c. Windows and Linux
d. UNIX

35) Ethereal & Ettercap Network analyzer tool supports _____ operating system.
a. Windows
b. Windows and UNIX
c. Windows and Linux
d. UNIX

36) Dsniff Network analyzer tool supports ___ operating system.


a. Windows
b. Windows and UNIX
c. Windows and Linux
d. UNIX

37) ____ tools can modify the ARP tables, which are responsible for saving IP addresses to MAC address
mappings on network hosts.
a. Dsniff tool
b. Cain & Abel tool
c.
d.

Both a & b
None of the above

38)The victims machines think they require to forward traffic to the hacker’s computer rather than to the
correct destination machine when communicating on the network and this type of is called as _____
a. Denial of service attack
b. Man-in-the-middle attack
c. ARP spoofing attack
d. None of the above

39) An excessive amount of ARP requests can be a sign of an ____ attack on your network. a. ARP
poisoning attack
b. ARP spoofing attach
c. Man-in-the-middle attack
d. Both a & b

40) Email bomb is also known as __


a. Rogue networks
b. Attachment overloading attack
c. Letter bomb
d. Storage overload

41) ____ can be captured directly out of the airwaves, making this communication medium susceptible to
malicious eavesdropping.
a. Wired traffic
b. Wireless traffic
c. Rogue networks
d. Physical security problems

42) WEP stands for ____


a. Wired Equivalent Privacy
b. Wired Equivalent Protocol
c. Wireless Equivalent Privacy
d. Wireless Equivalent Protocol

43) The Orinoco Client Manager software stores ____ keys in the windows Registry even for multiple
networks.
a. Decrypted WEP
b. Encrypted WEP
c. Both a & b
d. None of the above

44) SSIDs stands for____


a. Service Support IDentifier
b. Secure Service IDentifier
Service Set IDentifier
None of the above

45)An _____ is a program that acts as an interface between the software and computer hardware. a.
Networking
b. Remote code execution
c. Storage overload
d. Operating System

46) The hackers attacks against messaging systems include ___


a. Transmitting malware
b. Crashing Servers
c. Obtaining remote control of workstations
d. All of the above

47) An attacker can create an ______attack by sending hundreds or thousands of e-mails with very large
attachments.
a. Connection attack
b. Autoresponder attack
c. Attachment overloading attack
d. All of the above

48) Multiple large messages can quickly fill the total storage capacity of an e-mail server is called as __
a. Email bomb
b. Storage overload
c. Bandwidth blocking
d. Connection attack

49) What are the countermeasures are there to prevent attachment-overloading attack?
a. Limit the size of either e-mails or e-mail attachments
b. Limit each user’s space on the server
c. Both a & b
d. None of the above

50) Which attack is often carried out as spam attack?


a. Email bomb
b. Storage overload
c. Bandwidth blocking
c.
d.

d. Connection attack

51) ____ is that annoying automatic e-mail response you often get back from random users when you’re
subscribing to a mailing list.
a. Connection attack
b. Autoresponder attack
c. Attachment overloading attack
d. All of the above

52) ___ attack is basically browsing a site and looking for clues about the server’s directory structure. a.
SQL Injection
b. Cross site Scripting
c. Directory Traversals
d. Security Misconfiguration

You might also like