IT Security & Ethical Hacking

132 Questions | Total Attempts: 185

SettingsSettingsSettings
IT SecurITy & Ethical Hacking - Quiz

This exam is meant for the final module for WCSE


Questions and Answers
  • 1. 
    Which of the following is a remote administration tool used by attackers to take control of Windows-based systems in a backdoor type of attack?
    • A. 

      Back Orifice

    • B. 

      Dictionary

    • C. 

      Man-in-the-middle

    • D. 

      Brute force

  • 2. 
    Which of the following are popular examples of denial-of-service attacks? (Choose all that apply.)
    • A. 

      Buffer overflow

    • B. 

      Star of pain

    • C. 

      Ping of death

    • D. 

      Memlock

  • 3. 
    Which of the following is another name for active sniffing?
    • A. 

      War driving

    • B. 

      Chalking

    • C. 

      TCP/IP hijacking

    • D. 

      Apt cleanup

  • 4. 
    During which general type of attack does someone try to disrupt your network and services?
    • A. 

      Access

    • B. 

      Modification and repudiation

    • C. 

      Denial-of-service

    • D. 

      Interception

  • 5. 
    Which of the following goals of information security refers to identifying events when they occur?
    • A. 

      Detection

    • B. 

      Prevention

    • C. 

      Recursion

    • D. 

      Response

  • 6. 
    Which language is seen as a successor to HTML and offers many capabilities that HTML does not?
    • A. 

      XML

    • B. 

      SGML

    • C. 

      CSS

    • D. 

      CML

  • 7. 
    Which of the following are common ways to provide secure connections between a web client and a web server? (Choose two.)
    • A. 

      ActiveX

    • B. 

      SSL/TLS

    • C. 

      SML

    • D. 

      HTTPS

  • 8. 
    Java applets run in a restricted area of memory. What is this restricted area known as?
    • A. 

      DMZ

    • B. 

      Parking lot

    • C. 

      Sandbox

    • D. 

      No-fly zone

  • 9. 
    What is the term used when an application receives more data than it is programmed to accept?
    • A. 

      Buffer overflow

    • B. 

      Cookie

    • C. 

      SMTP Relay

    • D. 

      Open Relay

  • 10. 
    Which file extension is used to indicate a JavaScript file?
    • A. 

      .jar

    • B. 

      .java

    • C. 

      .js

    • D. 

      .jpg

  • 11. 
    What is the term used for a text file that a browser maintains on a user's hard disk in order to store information about the user?
    • A. 

      Buffer overflow

    • B. 

      Cookie

    • C. 

      SMTP Relay

    • D. 

      Open Relay

  • 12. 
    Which of the following is the process of systematically identifying a network and its security posture?
    • A. 

      Packet sniffing

    • B. 

      Footprinting

    • C. 

      Scanning

    • D. 

      Signal analysis/intelligence

  • 13. 
    Which type of instant messaging (IM) attack can occur when a user closes one window and dozens of others suddenly pop open?
    • A. 

      Jamming

    • B. 

      DoS

    • C. 

      Buffer overflow

    • D. 

      Flooding

  • 14. 
    What is the term used for an email feature intended to allow the server to forward email to other servers?
    • A. 

      Buffer overflow

    • B. 

      Cookie

    • C. 

      SMTP Relay

    • D. 

      Open Relay

  • 15. 
    Which protocol is used to manage group or multicasting sessions?
    • A. 

      SNMP

    • B. 

      ICMP

    • C. 

      IGMP

    • D. 

      TFTP

  • 16. 
    Which type of instant messaging (IM) problem can occur from a malformed MIME message?
    • A. 

      Jamming

    • B. 

      DoS

    • C. 

      Buffer overflow

    • D. 

      Flooding

  • 17. 
    Which of the following file extensions would not indicate an executable file?
    • A. 

      .bat

    • B. 

      .com

    • C. 

      .exe

    • D. 

      None of the above

  • 18. 
    What is the term used for an exploited email feature originally intended to allow the server to forward email to other servers?
    • A. 

      Buffer overflow

    • B. 

      Cookie

    • C. 

      SMTP Relay

    • D. 

      Open Relay

  • 19. 
    Which of the following is the process that attackers use to gather information about how your network is configured?
    • A. 

      Packet sniffing

    • B. 

      Footprinting

    • C. 

      Scanning

    • D. 

      Signal analysis/intelligence

  • 20. 
    Which file extension is used to indicate a JPEG file?
    • A. 

      .jar

    • B. 

      .java

    • C. 

      .js

    • D. 

      .jpg

  • 21. 
    Which type of IM attack is intended to disrupt existing systems by injecting or flooding a channel with garbage data?
    • A. 

      Jamming

    • B. 

      DoS

    • C. 

      Buffer overflow

    • D. 

      Flooding

  • 22. 
    You want to block all web traffic on the firewall, with and without SSL. Which port(s) should you block? (Choose all that apply.)
    • A. 

      80

    • B. 

      334

    • C. 

      443

    • D. 

      801

  • 23. 
    Which of the following is not one of the main components of the security triad?
    • A. 

      Distributed

    • B. 

      Physical

    • C. 

      Operational

    • D. 

      Management

  • 24. 
    Which of the following goals of information security refers to preventing computer or information violations from occurring?
    • A. 

      Detection

    • B. 

      Prevention

    • C. 

      Recursion

    • D. 

      Response

  • 25. 
    During which general type of attack does someone who should not be able to get access attempt to get to your resources?
    • A. 

      Access

    • B. 

      Modification and repudiation

    • C. 

      Denial-of-service

    • D. 

      Interception

Back to Top Back to top