Ethical Hacking Quiz 4
Which strategies can help to prevent power analysis attacks?
a) The computation times in the different branches of conditional statements must be the same.
b) We can use a random noise generator in the circuit.
b) We can use a random noise generator in the circuit.
What is the meaning of PUF?
Physically Unclonable Function
Which statements are true for hardware Trojans?
a) It incurs small hardware overhead.
b) It is stealthy and usually difficult to detect.
b) It is stealthy and usually difficult to detect.
What are some of the software-based countermeasures to prevent timing-based side-channel attack?
a) Mask the data representation.
b) Introduce redundant computations as required.
b) Introduce redundant computations as required.
Which Metasploit module can be used to establish communication channel between Metasploit framework and target system?
Payload
Which command is used to launch Metasploit framework?
msfconsole
In Metasploit to check the compatible target (OS) for any exploit, which command is used?
Show targets
Can we execute basic commands and tools inside Metasploit console?
True
Which command can be used to get user account details in Metasploit framework?
hashdump
Which types of attacks are possible on a webservers/web applications?
a) Denial-of-Services
b) Cross-Site-Scripting
c) SQL Injection
d) Session Hijacking
b) Cross-Site-Scripting
c) SQL Injection
d) Session Hijacking
Which tool uses brute-force attack to extract existing and hidden page of a webserver?
Dirb
If any web page is vulnerable to error based sql injection, then what will happen?
It will print error message for incorrect user input.
Which SQLMAP options is used to list all users along with hashed password?
–passwords
What are some of the software-based countermeasures to prevent timing-based side-channel attack?
Use a structured programming language for implementation.
With help of NMAP tool, what all we can do?
a) We can determine which host are alive.
b) We can determine the services running on any target system.
c) We can determine the OS of the target systems.
d) We can identify the vulnerabilities of the target system.
b) We can determine the services running on any target system.
c) We can determine the OS of the target systems.
d) We can identify the vulnerabilities of the target system.
In ICMP (ECHO) sweep scan, a scanner sends an ICMP type-8 packet and receives a ICMP type-0 packet from target. What does it indicates?
Target is alive/up.
Which sweep scans are automatically done when using the -sn option?
a) ICMP Echo
b) ICMP Non-Echo
c) TCP Sweep
b) ICMP Non-Echo
c) TCP Sweep
The number of host (IP) scanned by NMAP command “nmap -sL 192.168.62.48-58” will be
11
Which NMAP option treats all hosts as online (skip host discovery)?
-Pn
How many ports will be scanned using NMAP command “nmap –top-ports 5 Target_IP”?
5
In NMAP by default ____ number of ports are scanned.
1000
In NMAP scan, a filtered port indicates that either the firewall or any other filter software is blocking nmap requests.
a) True
b) False
a) True
b) False
a) True
Which NMAP options can be used for OS, Services and Version detection?
a) -sV
b) -O
b) -O
Total Number of Questions: 23
Also Available: