This quiz, titled '312-50 (Mixed Questions Set 2)', evaluates skills in cybersecurity through realistic penetration testing scenarios. It covers topics such as reconnaissance, ARP, metadata analysis, and collision attacks in cryptography, essential for professionals in the field.
NIST-800-53
PCI-DSS
EU Safe Harbor
HIPAA
Rate this question:
It sends a request packet to all the network elements, asking for the MAC address from a specific IP.
It sends a reply packet to all the network elements, asking for the MAC address from a specific IP.
It sends a reply packet for a specific IP, asking for the MAC address.
It sends a request packet to all the network elements, asking for the domain name from a specific IP.
Rate this question:
Metagoofil
Armitage
Dimitry
Cdpsnarf
Rate this question:
Site: target.com filetype:xls username password email
Inurl: target.com filename:xls username password email
Domain: target.com archive:xls username password email
Site: target.com file:xls username password email
Rate this question:
Collision attacks try to find two inputs producing the same hash.
Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key.
Collision attacks try to get the public key.
Collision attacks try to break the hash into three parts to get the plaintext value.
Rate this question:
Social engineering
Tailgating
Piggybacking
Eavesdropping
Rate this question:
Http-methods
Http enum
Http-headers
Http-git
Rate this question:
Burp suite
Maskgen
Dimitry
Proxychains
Rate this question:
Tcp.dstport==514 && ip.dst==192.168.0.150
Tcp.srcport==514 && ip.src==192.168.0.99
Tcp.dstport==514 && ip.dst==192.168.0.0/16
Tcp.srcport==514 && ip.src==192.168.150
Rate this question:
RSA
SHA
RC5
MD5
Rate this question:
I, II, and III
I
II
I and II
Rate this question:
Incident Management Process
Security Policy
Internal Procedure
Metrics
Rate this question:
Injection
Cross Site Scripting
Cross Site Request Forgery
Path disclosure
Rate this question:
Report immediately to the administrator
Do not report it and continue the penetration test.
Transfer money from the administrator's account to another account.
Do not transfer the money but steal the bitcoins.
Rate this question:
Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
Modifies directory table entries so that directory entries point to the virus code instead of the actual program
Overwrites the original MBR and only executes the new virus code
Rate this question:
Grep
Notepad
MS Excel
Relational Database
Rate this question:
Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels.
Interview all employees in the company to rule out possible insider threats.
Establish attribution to suspected attackers.
Start the wireshark application to start sniffing network traffic.
Rate this question:
The host is likely a printer.
The host is likely a Windows machine.
The host is likely a Linux machine.
The host is likely a router.
Rate this question:
Height and Weight
Voice
Fingerprints
Iris patterns
Rate this question:
Bluedriving
Bluejacking
Bluesmacking
Bluesnarfing
Rate this question:
Footprinting
Network mapping
Gaining access
Escalating privileges
Rate this question:
Wireless Intrusion Prevention System
Wireless Access Point
Wireless Access Control List
Wireless Analyzer
Rate this question:
A ping scan
A trace sweep
An operating system detect
A port scan
Rate this question:
>host -t a hackeddomain.com
>host -t soa hackeddomain.com
>host -t ns hackeddomain.com
>host -t AXFR hackeddomain.com
Rate this question:
TCPDump
Nessus
Etherea
Jack the ripper
Rate this question:
Promiscuous mode
Port forwarding
Multi-cast mode
WEM
Rate this question:
Unicode characters
Spyware
Port knocking
Subnetting
Rate this question:
PKI
Single sign on
Biometrics
SOA
Rate this question:
Service Oriented Architecture
Object Oriented Architecture
Lean Coding
Agile Process
Rate this question:
ESP transport mode
AH permiscuous
ESP confidential
AH Tunnel mode
Rate this question:
Integrity
Confidentiality
Authentication
Availability
Rate this question:
A backup is the source of Malware or illicit information.
A backup is unavailable during disaster recovery.
A backup is incomplete because no verification was performed.
An un-encrypted backup can be misplaced or stolen.
Rate this question:
The network devices are not all synchronized.
Proper chain of custody was not observed while collecting the logs.
The attacker altered or erased events from the logs.
The security breach was a false positive.
Rate this question:
Likelihood is the probability that a threat-source will exploit a vulnerability.
Likelihood is a possible threat-source that may exploit a vulnerability.
Likelihood is the likely source of a threat that could exploit a vulnerability.
Likelihood is the probability that a vulnerability is a threat-source.
Rate this question:
$146
$1320
$440
$100
Rate this question:
File system permissions
Privilege escalation
Directory traversal
Brute force login
Rate this question:
Cross-Site Request Forgery
Cross-Site Scripting
Clickjacking
Web form input validation
Rate this question:
Attempts by attackers to access Web sites that trust the Web browser user by stealing the user's authentication credentials.
Attempts by attackers to access the user and password information stored in the company's SQL database.
Attempts by attackers to access passwords stored on the user's computer without the user's knowledge.
Attempts by attackers to determine the user's Web browser usage patterns, including when sites were visited and for how long.
Rate this question:
Cross-site scripting vulnerability
Cross-site Request Forgery vulnerability
SQL injection vulnerability
Web site defacement vulnerability
Rate this question:
Use cryptographic storage to store all PII
Use encrypted communications protocols to transmit PII
Use full disk encryption on all hard drives to protect PII
Use a security token to log into all Web applications that use PII
Rate this question:
Validate and escape all information sent to a server
Use security policies and procedures to define and implement proper security settings
Verify access right before allowing access to protected information and UI controls
Use digital certificates to authenticate a server prior to sending data
Rate this question:
RADIUS
DIAMETER
Kerberos
TACACS+
Rate this question:
The WAP does not recognize the client’s MAC address
The client cannot see the SSID of the wireless network
Client is configured for the wrong channel
The wireless client is not configured to use DHCP
Rate this question:
Protocol analyzer
Intrusion Prevention System (IPS)
Network sniffer
Vulnerability scanner
Rate this question:
Insufficient input validation
Insufficient exception handling
Insufficient database hardening
Insufficient security management
Rate this question:
SYSLOG
SMS
SNMP
ICMP
Rate this question:
Running a network scan to detect network services in the corporate DMZ
Training employees on the security policy regarding social engineering
Reviewing the need for a security clearance for each employee
Using configuration management to determine when and where to apply security patches
Rate this question:
Firewall
Bastion host
Intrusion Detection System
Honeypot
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.