Cyber Quest Final Assessment

35 Questions

Settings
Please wait...
Internet Quizzes & Trivia

Questions and Answers
  • 1. 
    • A. 

      Dir

    • B. 

      Ping

    • C. 

      Ls

    • D. 

      Hello

  • 2. 
    • A. 

      Windows

    • B. 

      Linux

    • C. 

      Unix

    • D. 

      Excel

  • 3. 
    • A. 

      34.2.45

    • B. 

      44.23.2.45

    • C. 

      4.34.300.200

    • D. 

      Www.google.com

  • 4. 
    In Linux, what command would you use for determining the files in a directory?
    • A. 

      Pwd

    • B. 

      Df

    • C. 

      Ls

    • D. 

      Man

  • 5. 
    • A. 

      Router

    • B. 

      Switch

    • C. 

      Firewall

    • D. 

      Gateway

  • 6. 
    A virtual machine is:
    • A. 

      One operating system running in software that is running in another operating system

    • B. 

      A computer with no keyboard

    • C. 

      A computer connected to the internet

    • D. 

      A computer that can boot into multiple operating systems

  • 7. 
    • A. 

      A set of executable code

    • B. 

      A currently running instance of a program

    • C. 

      A collection of files

    • D. 

      The location of a file in the file system

  • 8. 
    • A. 

      -rw-rw-rw- 1 user user 3391 Mar 15 2013 myfile.txt

    • B. 

      -rw--r--r-- 1 nobody user 7099 Apr 2 13:58 logfile

    • C. 

      Drwxr-xr-x 1 user user 4096 Mar 15 2013 Desktop

    • D. 

      -rwxr-xr-x 1 root root 145320 Jun 10 2012 less

  • 9. 
    • A. 

      Stop

    • B. 

      Kill

    • C. 

      Man

    • D. 

      Ps

  • 10. 
    Processes that are capable of handling requests that come over the network will be listening for requests on:
    • A. 

      A user account

    • B. 

      A port

    • C. 

      A directory

    • D. 

      A name

  • 11. 
    The IPv4 Domain Name System (or DNS) is responsible for:
    • A. 

      Mapping ports to processes

    • B. 

      Mapping MAC addresses to IP address

    • C. 

      Mapping an IP address to a human readable name

    • D. 

      Mapping users to computers

  • 12. 
    Another name for a folder is:
    • A. 

      A directory

    • B. 

      A file

    • C. 

      An IP address

    • D. 

      A process

  • 13. 
    Which of the following commands will take the output of the ls command and put it in a file name output.txt?
    • A. 

      Output.txt < ls

    • B. 

      Ls > output.txt

    • C. 

      Ls | output.txt

    • D. 

      Ls output.txt

  • 14. 
    • A. 

      255.255.255.0

    • B. 

      255.255.255.128

    • C. 

      255.255.255.192

    • D. 

      255.255.255.252

  • 15. 
    The following is a listing for a file. What are the user/group assignments for this file?   drwxr-xr-x 1 nobody root 4096 Mar 15 2013 Desktop
    • A. 

      User of nobody, group of root

    • B. 

      User of root, group of nobody

    • C. 

      User and group of nobody

    • D. 

      User and group of root

  • 16. 
    In Linux, the top level (or root) directory is:
    • A. 

      C:\

    • B. 

      /usr

    • C. 

      /bin

    • D. 

      /

  • 17. 
    A common name for the account with full privileges in Linux is:
    • A. 

      Nobody

    • B. 

      User

    • C. 

      Root

    • D. 

      Www

  • 18. 
    The command to change your current working directory, to the directory above it is:
    • A. 

      Ls ..

    • B. 

      Cd ..

    • C. 

      Cd

    • D. 

      Cd /

  • 19. 
    • A. 

      Http:

    • B. 

      Https:

    • C. 

      Ftp:

    • D. 

      Smtp:

  • 20. 
    • A. 

      Something the user has

    • B. 

      Something the user is

    • C. 

      Something the user knows

    • D. 

      Any of the above

  • 21. 
    • A. 

      Router

    • B. 

      Switch

    • C. 

      Network attached storage

    • D. 

      Gateway

  • 22. 
    • A. 

      Applying patches

    • B. 

      Applying updates

    • C. 

      Applying service packs

    • D. 

      All of the above

  • 23. 
    A terminal is an example of:
    • A. 

      A command line interface

    • B. 

      A GUI interface

  • 24. 
    To remotely determine what services may be running on a server, a common technique is:
    • A. 

      To ping the server

    • B. 

      Port scanning the server

    • C. 

      Getting a directory listing

    • D. 

      Opening a file

  • 25. 
    Operating system passwords are generally stored as:
    • A. 

      As clear text

    • B. 

      Unencrypted

    • C. 

      Hashed

    • D. 

      Reversibly encrypted

  • 26. 
    • A. 

      Wireshark

    • B. 

      Nmap

    • C. 

      Ping

    • D. 

      Owasp

  • 27. 
    The TCP three way handshake consists of the following flags being set in the TCP packets:
    • A. 

      FIN; FIN/ACK; ACK

    • B. 

      SYN; SYN; SYN

    • C. 

      ACK; ACK; ACK

    • D. 

      SYN; SYN/ACK; ACK

  • 28. 
    The privileged TCP ports are:
    • A. 

      Less than 1024

    • B. 

      Greater than 1024

    • C. 

      Divisible by 2

    • D. 

      Greater than 65535

  • 29. 
    To make it harder to determine what an attacker is doing, the attacker will often:
    • A. 

      Delete log files

    • B. 

      Install rootkits

    • C. 

      Kill logging processes

    • D. 

      All of the above

  • 30. 
    Encrypt The message "THE HACKER IS NEAR" using the Caesar Cipher system below:   Standard Alphabet: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z   Caesar Alphabet: X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
    • A. 

      KBXO FP EXZHBO QEB

    • B. 

      THE HACKER IS NEAR

    • C. 

      QEB EXZHBO FP KBXO

    • D. 

      THE EXZHBO IS NEAR

  • 31. 
    If we want to monitor web traffic, what information is useful? 
    • A. 

      Source IP Address

    • B. 

      Destination Port

    • C. 

      Destination Address

    • D. 

      All of the Above

  • 32. 
    • A. 

      DMA

    • B. 

      IPSec

    • C. 

      SSL

    • D. 

      SMTP

  • 33. 
    • A. 

      Race Condition

    • B. 

      Buffer Overflow

    • C. 

      Password Attack

    • D. 

      Man In The Middle

  • 34. 
    When the attacker captures information from the client, then forwards it on to the intended server, the attacker is performing a/an:
    • A. 

      Man-in-the-middle attack

    • B. 

      Social Engineering

    • C. 

      Warchalking

    • D. 

      Buffer Overflow

  • 35. 
    To sniff traffic on an Ethernet network, the attacker will usually need to use which of the following attacks:
    • A. 

      Buffer Overflow

    • B. 

      ARP spoofing

    • C. 

      Denial of Service

    • D. 

      SQL Injection