Ethical Hacking Quiz 3
What are some examples of steganography?
1. Hiding some text information within an image file.
2. Hiding some text information within an audio clip.
3. Hiding some secret information within an executable file.
2. Hiding some text information within an audio clip.
3. Hiding some secret information within an executable file.
Which of the following correspond to behavioral biometrics?
a) Biometrics that relate to human behavior.
b) Biometrics that relate to human body.
a) Biometrics that relate to human behavior.
b) Biometrics that relate to human body.
a) Biometrics that relate to human behavior.
Consider a gray-level image of size 1000 x 1000, where each pixel is stored in 8-bits (representing a gray scale). How many bits of information can be hidden in the image by using LSB steganography technique?
1 Mbits
What is a denial-of-service (DoS) attack?
A denial-of-service (DoS) attack is a malicious attempt to disrupt the normal functioning of a machine or network. This type of attack overwhelms the target with excessive traffic, rendering it unavailable to its intended users.
What type of attack involves an attacker gaining access to a victim’s machine (or spoofing its IP address) and then sending a ping request to a broadcast address?
Smurf denial-of-service attack.
Which attack relies on a vulnerability in the TCP connection establishment phase?
SYN flooding attack
A Botnet refers to a host connected to the Internet that is under control of the _____.
attacker
What is the full form of PGP in cyber security?
Pretty Good Privacy
What is sniffing in cyber security?
Sniffing is a process of analyzing network activity by capturing network traffic.
____ is a popular tool used for sniffing.
Burp suite
What is the purpose of repeater module available in burp suite?
It is used for manipulating and reissuing packets and to analyze their response.
Which approach cannot protect against sniffing?
Using dynamic IP address and ARP entries.
Which are examples of human-based social engineering attacks?
a. Impersonation
b. Piggybacking
c. Shoulder surfing
b. Piggybacking
c. Shoulder surfing
Which tools can be used for social engineering attacks?
SEToolkit
Which protocols are not vulnerable to sniffing attacks?
a. SSH
b. SSL
b. SSL
Which can be used as a countermeasure for DoS/DDoS attacks?
a. Replicate servers to provide additional failsafe protection.
b. Increase bandwidth on critical connections.
c. Secure the infrastructure using approaches such as anti-spam, content filtering, anti-trojan, firewalls, and load balancing.
d. Shut down all services until the attack has subsided.
b. Increase bandwidth on critical connections.
c. Secure the infrastructure using approaches such as anti-spam, content filtering, anti-trojan, firewalls, and load balancing.
d. Shut down all services until the attack has subsided.
Which tool or approach cannot be used to perform a DoS attack?
Hydra and Crunch
For mounting DoS attack using hping3 tool how many packets will be send per second if we use faster option?
100
Which statements are true for black box testing kind of attack?
It is a non-invasive type of attack.
What are the typical countermeasures to prevent hardware-based attacks?
a. We obfuscate data in registers and buses.
b. We add preventive measures against side-channel attacks.
c. We provide authentication using physical unclonable functions.
b. We add preventive measures against side-channel attacks.
c. We provide authentication using physical unclonable functions.
Which statements are true for side channel attacks?
a. They exploit some weakness in the implementation of the algorithm.
b. They require physical access to the device.
b. They require physical access to the device.
Which side channels are typically exploited in side-channel attacks?
a. Electromagnetic emissions.
b. Time taken to execute an algorithm.
c. Power consumed during computation.
b. Time taken to execute an algorithm.
c. Power consumed during computation.
For modular exponentiation computation of x17, how many squaring and multiplication operations would be required?
4 and 1
What does power analysis do?
It measures variation in power consumption during a computation.
1000+ students are getting help from instant notifications. Join us on Telegram.
Also Available: