Kautilya Institute Of Technology And Enggineering

35 Questions

Settings
Please wait...
Kautilya Institute Of Technology And Enggineering

.


Questions and Answers
  • 1. 
    When you telnet to the POP port on the target computer, which port you could be connecting to?
    • A. 

      1. Port 110 or Port 25

    • B. 

      2. Port 80 or Prot 1110

    • C. 

      3. Port 8080 or Port 1234

    • D. 

      4. One of the above.

    • E. 

      5. All of the above.

  • 2. 
    For a website, what is the best way to protect their visitors from key loggers?
    • A. 

      1. Antivirus Software.

    • B. 

      2. Highest Browser Security Settings.

    • C. 

      3. Antispyware software.

    • D. 

      4. Secure Auditing.

    • E. 

      5. Virtual Key logger.

  • 3. 
    If you have physical access to a Windows system which has a login password, then what is the fastest & most efficient way to steal data from the local hard drive?
    • A. 

      1. Crack the Windows login password.

    • B. 

      2. Do a security audit hack into system from internal network.

    • C. 

      3. Boot into Unix Live CD.

    • D. 

      4. Use Biometric Cracks

    • E. 

      5. Steal HDD physically

  • 4. 
    If you wish to commit a perfect a cyber crime, then which of the following would do?
    • A. 

      1. Spoof your MAC address.

    • B. 

      2. Connect to a proxy server.

    • C. 

      3. Use an Internet Cafe.

    • D. 

      4. All of the above.

    • E. 

      5. Any two of the first three options.

  • 5. 
    What is a good countermeasure to phishing?
    • A. 

      1. Firewall

    • B. 

      2. URL Analysis’

    • C. 

      3. Hardware Device.

    • D. 

      4. Awareness.

    • E. 

      5. Digital Certificate of the page.

  • 6. 
    If you want to prevent malicious attacks (that originate inside your network) from leaving your network, then what would you recommend?
    • A. 

      1. Software based Firewall.

    • B. 

      2. Hardware based Firewall.

    • C. 

      3. Data Sniffer.

    • D. 

      4. Reverse DNS Trace.

    • E. 

      5. Proxy Server

  • 7. 
    If your company or college is using software to monitor all your activities on your desktop computer, then what can you do to stop the monitoring?
    • A. 

      1. Disable the Firewall

    • B. 

      2. Disable the Sniffer.

    • C. 

      3. Disable the Trojan.

    • D. 

      4. Use Encryption.

    • E. 

      5. HTTP Tunneling

  • 8. 
    In the CAPTCHA system, why we use background of different colors?
    • A. 

      1. To prevent Brute Force cracking.

    • B. 

      2. To prevent spam.

    • C. 

      3. To prevent spoofing.

    • D. 

      4. To prevent sniffing tools.

    • E. 

      5. To prevent OCR tools from working.

  • 9. 
    How can you find out a remote computer's MAC address?
    • A. 

      1. Windows Registry.

    • B. 

      2. Net stat.

    • C. 

      3. Data Sniffer.

    • D. 

      4. Ether change tool.

    • E. 

      5. Ping

  • 10. 
    Usually when you port scan your home computer, you will find that some ports are open? Why?
    • A. 

      1. There are daemons running on these open ports.

    • B. 

      2. There are Trojans, spyware and key loggers installed on these open ports.

    • C. 

      3. The applications running on your system are using these open ports.

    • D. 

      4. An attacker might be connecting to your system.

    • E. 

      5. I don't know.

  • 11. 
    If you want to steal the data from a password protected computer, what is the best technique?
    • A. 

      1. Brute Force.

    • B. 

      2. Install Data Sniffer on another computer on same network.

    • C. 

      3. War Driving.

    • D. 

      4. Live CD.

    • E. 

      5. Trojans.

  • 12. 
    How is connection terminated in TCP/IP?
    • A. 

      1. A sends FIN/ACK to B.B sends a FIN/ACK to A.A sends an ACK to B.

    • B. 

      2. A sends FIN to B.B sends a FIN/ACK to A.A sends an ACK to B.

    • C. 

      3. A sends FIN to B.B sends a FIN to A.A sends an ACK to B.

    • D. 

      4. A sends FIN to B.B sends an ACK to A.A sends an ACK to B.

    • E. 

      5. A sends FIN/ACK to B.B sends an ACK to A.A sends an ACK to B.

  • 13. 
    If you are the system administrator of a college and want to block use of peer to peer file sharing software, then what do you need to do?
    • A. 

      1. Prevent use of cookies.

    • B. 

      2. Block certain ports.

    • C. 

      3. Block certain IP addresses.

    • D. 

      4. Block certain protocols.

    • E. 

      5. Block certain keywords.

  • 14. 
    When you use the ipconfig command then your IP address is shown to be X,while when you visit www.whatismyip.com then your Ip address is shown to be Y.Which is your internal IP address and which is your external IP address?
    • A. 

      1. X is Internal,Y is External.

    • B. 

      2. Y is Internal is External.

    • C. 

      3. Both are External.

    • D. 

      4. Depends on whether proxy server is being used or not.

    • E. 

      5. Depends on whether there is a firewall or not.

  • 15. 
    Are switching networks vulnerable to sniffers?
    • A. 

      1. No since only those data packets meant for a host reach the NIC.

    • B. 

      2. Yes.

    • C. 

      3. Don't know.

    • D. 

      4. Depends upon the operating system.

    • E. 

      5. I searched on Google but could not find the answer.

  • 16. 
    How to prevent infection by virus through Facebook?
    • A. 

      1. When an unknown person adds you, do not accept request.

    • B. 

      2. When an unknown person sends you a private message, do not open it.

    • C. 

      3. When you are prompted to download something, do not accept it.

    • D. 

      4. When you are to join a group, do not accept it.

  • 17. 
    What is HTTP tunneling?
    • A. 

      1. A secure way of communication.

    • B. 

      2. Working with any protocol transmitting it through http.

    • C. 

      3. VPN

    • D. 

      4. None of the above.

  • 18. 
    Let us assume you are communicating with two different people A and B.Both A and B on the same remote network. When you try to find out their IP address on your system, can they have the same IP address?
    • A. 

      1. Yes

    • B. 

      2. No.

    • C. 

      3. Maybe

    • D. 

      4. Only if they are using a proxy server.

  • 19. 
    What is the countermeasure to Brute Force Password Cracking?
    • A. 

      1. Ensure that password is long.

    • B. 

      2. Ensure that password has symbols.

    • C. 

      3. Ensure that SSL encryption us used for Web application accessing the password.

    • D. 

      4. Ensure that CAPTCHA is implemented.

    • E. 

      5. Ensure that digital signature are using.

  • 20. 
    How can you protect your IP Address while Surfing?
    • A. 

      1. Google Language Translator

    • B. 

      2. Web Based Proxy

    • C. 

      3. Proxy Chains

    • D. 

      4. Any two of the above

    • E. 

      5. All of the above

  • 21. 
    How can you detect SQL Injection Loopholes on the internet?
    • A. 

      1. Manual Trial and Error

    • B. 

      2. SQL Injection Scanners

    • C. 

      3. Google Hacking

    • D. 

      4. All of above

  • 22. 
    What class does the IP Address 198.54.11.0 belong to?
    • A. 

      1. Class A

    • B. 

      2. Class B

    • C. 

      3. Class C

    • D. 

      4. Class D

  • 23. 
    What are Phishing Attacks?
    • A. 

      1. The art of sending a fake login screen to the victim

    • B. 

      2. The art of sending a fake password to the victim

    • C. 

      3. The art of smooth talking to the victim

    • D. 

      4. The art of use of smart cross site scripting

    • E. 

      5. The art of sending spam to the victim

  • 24. 
    What does a DNS Lookup do?
    • A. 

      1. Searches Google for DNS lookup

    • B. 

      2. Convert an IP Address into DNS

    • C. 

      3. Convert a DNS into IP Address

    • D. 

      4. Tells you whether a domain name is registered or not

    • E. 

      5. Tells you whether you are connected to internet or not

  • 25. 
    Which port would you connect to in order to download your emails manually?
    • A. 

      1. Port 25

    • B. 

      2. Port 23

    • C. 

      3. Port 110

    • D. 

      4. Port 80

    • E. 

      5. Port 69

  • 26. 
                  If port 79 on the target computer is open, what do you know about the type of the daemon running on it?
    • A. 

      1. It is a finger daemon

    • B. 

      2. It is a SMTP daemon

    • C. 

      3. It is a POP daemon

    • D. 

      4. It is a HTTP daemon

    • E. 

      5. Can’t say

  • 27. 
     Why does Microsoft windows crash whenever you try to create a “con” file?
    • A. 

      1. Can’t handle such a file name

    • B. 

      2. Buffer overflow

    • C. 

      3. Cross site scripting

    • D. 

      4. Lack of awareness of user

  • 28. 
     What are Sockets?
    • A. 

      1. Sockets are the types of data packets

    • B. 

      2. Sockets are the types of protocol

    • C. 

      3. Sockets are needed to establish a proper channel of communication

    • D. 

      4. Sockets are of a type of sniffing device

  • 29. 
    What is the role played by the checksums in TCP/IP?
    • A. 

      1. It checks the sum of various TTL value

    • B. 

      2. It checks the integrity of data

    • C. 

      3. It checks the sum of sequence number

    • D. 

      4. It checks the presence of malicious data packets

  • 30. 
    What  is the default port number for Web server such as IIS and Apache?  
    • A. 

      1. 60

    • B. 

      2. 55

    • C. 

      3. 80

    • D. 

      4. 70

    • E. 

      5. 26

  • 31. 
     What is the default port number for SMTP?       
    • A. 

      1. 21

    • B. 

      2. 22

    • C. 

      3. 28

    • D. 

      4. 25

  • 32. 
     What layer of OSI does the encryption/decryption?
    • A. 

      1. Network Layer

    • B. 

      2. Presentation Layer

    • C. 

      3. Data link layer

    • D. 

      4. Application Layer

  • 33. 
    Determine the class of the following IP address: 10011010 01000111 0010010 11100101      
    • A. 

      1. Class A

    • B. 

      2. Class B

    • C. 

      3. Class C

    • D. 

      4. Class D

  • 34. 
    What is the default subnet mask for a class C address
    • A. 

      1. 255.0.0.0

    • B. 

      2. 255.255.0.0

    • C. 

      3. 255.255.255.0

    • D. 

      4. 255.255.255.255

  • 35. 
     Which of the following are network management protocols?       
    • A. 

      1. SGMP

    • B. 

      2. SNMP

    • C. 

      3. CMIP

    • D. 

      4. MMC