Which of the following password cracking techniques is used when the attacker has some
information about the password?
A.
Hybrid Attack
B.
Dictionary Attack
C.
SyllableAttack
D.
Rule-based Attack
Rule-based Attack
Reference:http://202.154.59.182/mfile/files/Information-System/Computer-Forensics
%3B-Hard-Disk-and-Operating-Systems/CHAPTER-7-Applicatio
n-Password-Crackers.pdf(page 4, rule-based attack)
What are the scanning techniques that are used to bypass firewall rules and logging
mechanisms and disguise themselves as usual network traffic?
A.
Connect Scanning Techniques
B.
SYN Scanning Techniques
C.
Stealth Scanning Techniques
D.
Port Scanning Techniques
Stealth Scanning Techniques
Reference:http://wwww.pcfreak.
net/tutorials/hacking_info/arkin-network-scanning-techniques.pdf(page 7
Identify the correct formula for Return on Investment (ROI).
A.
ROI = ((Expected Returns – Cost of Investment) / Cost of Investment) * 100
B.
ROI = (Expected Returns+ Cost of Investment) / Cost of Investment
C.
ROI = (Expected Returns Cost of Investment) / Cost of Investment
D.
ROI = ((Expected Returns + Cost of Investment) / Cost of Investment) * 100
ROI = (Expected Returns Cost of Investment) / Cost of Investment
Reference:http://www.investopedia.com/terms/r/returnoninvestment.asp
Identify the attack represented in the diagram below:
A.
Input Validation
B.
Session Hijacking
C.
SQL Injection
D.
Denial-of-Service
Session Hijacking
Reference:http://en.wikipedia.org/wiki/Session_hijacking
NTP protocol is used to synchronize the system clocks of computers with a remote time
server or time source over a network. Which one of the following ports is used by NTP as
its transport layer?
A.
TCP port 152
B.
UDP port 177
C.
UDP port 123
D.
TCP port 113
UDP port 123
Page 3 out of 40 Pages |
Previous |