Ethical Hacking Quiz 2 Flashcard
Which of the following statement(s) is/are true about “Active Reconnaissance”?
a) Information about the target is collected directly.
b) There is a chance of detection in active reconnaissance
a) Information about the target is collected directly.
b) There is a chance of detection in active reconnaissance
Both a and b
Which are not an information source over the internet for an attackers?
1. YouTube
2. Hydra
2. Hydra
Which data cannot be retrieved about the target system/website using Whois database lookup?
History of the website.
Which search operators can narrow down the search results to a site that has the targeted search term in the URL?
inurl
Which information can be retrieved using DNS/Mail server enumeration?
1. Usernames
2. Computer names
3. IP address of system
4. Size of the network
2. Computer names
3. IP address of system
4. Size of the network
Which statement(s) are true for host discovery using ICMP ECHO and ICMP non-ECHO sweep?
a) In ICMP sweep, the attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.
b) In ICMP sweep, if the attacker does not receive an ICMP ECHO reply then the host is considered as down.
b) In ICMP sweep, if the attacker does not receive an ICMP ECHO reply then the host is considered as down.
Which options are used for host discovery using TCP and UDP sweep respectively?
a) PS, PU
b) PA, PU
b) PA, PU
Which information is retrieved by port scanning?
The services running on the target system.
What kind of packet is received if the target port is closed/filtered in TCP connect/SYN scan?
RST/ACK
Which option is used for OS and Version detection respectively?
O, -sV
How many ports are scanned in NMAP for a target system if we use -F option ____ ?
100
Which NMAP scanning options are correct with respect to port scanning?
a) -F
b) -p20
c) -p20-100
d) -p20, 22, 28, 80
b) -p20
c) -p20-100
d) -p20, 22, 28, 80
If we want to disable host discovery in port scanning, then which option can be used?
-Pn
Which of the following can be used to reconnaissance countermeasures?
a) Do not release critical info in public.
b) Encrypt password and sensitive information.
c) Restrict zone transfer.
d) Examine logs periodically.
e) Use firewalls.
a) Do not release critical info in public.
b) Encrypt password and sensitive information.
c) Restrict zone transfer.
d) Examine logs periodically.
e) Use firewalls.
All of these
Which of the following statement is true for Masquerade attack?
a) In this attack, some portion of message is altered on its way.
b) In this attack, the attacker pretends as a legitimate entity.
a) In this attack, some portion of message is altered on its way.
b) In this attack, the attacker pretends as a legitimate entity.
b) In this attack, the attacker pretends as a legitimate entity.
Consider the following statement:
(i) In symmetric key cryptography, the security depends on secrecy of the key.
(ii) In symmetric key cryptography, the security depends on encryption/decryption algorithm.
(i) In symmetric key cryptography, the security depends on secrecy of the key.
(ii) In symmetric key cryptography, the security depends on encryption/decryption algorithm.
Only (i) is true
25 parties want to exchange messages securely. The number of distinct key required by a symmetric key encryption algorithm and public key encryption technique like RSA will be ____ and ____ respectively.
300 and 50
How will be the plaintext for the cipher text “LETTY CEIV” encrypted using a substitution cipher approach, where each letter is replaced by the k-th next letter.
HAPPU YAER
In data encryption standard (DES), longer plain text are processed in ____ bit blocks.
64
The effective key lengths used in AES encryption algorithms can be:
a)128 bit
b) 192 bit
c) 256 bit
b) 192 bit
c) 256 bit
For decryption using public-key cryptography ____ is used.
Receiver’s private key
Which technique cannot be used for message authentication?
SHA-0
What is meant by collision in the context of hashing?
More than one different message can generate the same hash value.
A message M is fed to a hash function HASH to generate the hash value H:
H = HASH (M)
So, The number of bits in M is much ____ the number of bits in H.
H = HASH (M)
So, The number of bits in M is much ____ the number of bits in H.
larger than
Which of the following statement(s) is/are true?
a) Hashing realizes a one-to-one mapping.
b) Encryption realizes a one-to-one mapping.
c) Hashing realizes a many-to-one mapping.
a) Hashing realizes a one-to-one mapping.
b) Encryption realizes a one-to-one mapping.
c) Hashing realizes a many-to-one mapping.
Option b and c are true
Which of the following are hash functions?
a) MD5
b) Triple-DES
c) SHA-1
a) MD5
b) Triple-DES
c) SHA-1
a) MD5
c) SHA-1
c) SHA-1
What are the block size and key size of the DES algorithm?
64 bits, 56 bits
What kinds of algorithms are typically used in the computation of digital signature?
Cryptographic hash function.
The SSL record protocol is responsible for
a) High-speed data transmission
b) Data authentication
c) Non repudiation
a) High-speed data transmission
b) Data authentication
c) Non repudiation
None of these
Total Number of Questions: 29
ALSO AVAILABLE:
Leave a comment