Network Programming Quiz Questions

31 Questions | Total Attempts: 306

SettingsSettingsSettings
Please wait...
Network Programming Quiz Questions

.


Questions and Answers
  • 1. 
    You have just completed a scan of your servers, and you found port 31337 open. Which of the following programs uses that port by default? 
    • A. 

      NetBus

    • B. 

      Back Orifice

    • C. 

      Option 3

    • D. 

      Donald Dick

  • 2. 
    Which of the following programs can be used for port redirection? 
    • A. 

      Loki

    • B. 

      Recub

    • C. 

      Girlfriend

    • D. 

      FPipe

  • 3. 
    Which of the following best describes a covert communications? A program that appears desirable, but actually contains something harmful    
    • A. 

      A program that appears desirable, but actually contains something harmful

    • B. 

      A way of getting into a guarded system without using the required password

    • C. 

      A program or algorithm that replicates itself over a computer network and usually performs malicious actions

    • D. 

      Sending and receiving unauthorized information or data by using a protocol, service, or server to transmit info in a way in which it was not intended to be used

  • 4. 
    Which of the following best describes Netcat? 
    • A. 

      Netcat is a more powerful version of Snort and can be used for network monitoring and data acquisition. This program enables you to dump the traffic on a network. It can also be used to print out the headers of packets on a network interface that matches a given expression.

    • B. 

      Netcat is called the TCP/IP Swiss army knife. It works with Windows and Linux and can read and write data across network connections using TCP or UDP.

    • C. 

      Netcat is called the TCP/IP Swiss army knife. It is a simple Linux-only utility that reads and writes data across network connections using TCP or UDP.

    • D. 

      Netcat is called the TCP/IP Swiss army knife. It is a simple windows only utility that reads and writes data across network connections using TCP or UDP.

  • 5. 
    One of your user’s Windows computers has been running slowly and performing erratically. After looking it over, you find a suspicious-looking file named watching.dll. Which of the following programs uses that file? 
    • A. 

      SubSeven

    • B. 

        Donald Dick      

    • C. 

      Loki

    • D. 

      NetBus

  • 6. 
    Jane has noticed that her system is running strangely. However, even when she ran Netstat, everything looked fine. What should she do next? 
    • A. 

      Restore from a recent backup

    • B. 

      Remove any entries from the Windows startup folder

    • C. 

      Use a third party tool with a verified fingerprint

    • D. 

      Install patch.exe

  • 7. 
    You overheard a co-worker who is upset about not getting a promotion threaten to load FakeGina on to the boss’s computer. What does FakeGina do? 
    • A. 

      It captures all keystrokes entered after the system starts up

    • B. 

      It captues login usernames and password that are entered at system startup

    • C. 

      It is a hardware keystroke capture program

    • D. 

      It's a password trojan that emails password and usernames to a predetermined email address

  • 8. 
    Which covert communication program has the capability to bypass router ACLs that block incoming SYN traffic on port 80? 
    • A. 

      Firekiller 2000

    • B. 

      ACKCMD

    • C. 

      Stealth Tools

    • D. 

      Loki

  • 9. 
    What does the command nc –n –v –l -p 25 accomplish? 
    • A. 

      Forwards email on the remote server to the hacker's computer on port 25

    • B. 

      Opens up a netcat listener on the local computer on port 25

    • C. 

      Allows the hacker to use a victim's mail server to send spam

    • D. 

      Blocks all incoming traffic on port 25

  • 10. 
    What is Datapipe used for? 
    • A. 

      It is a virus

    • B. 

      It is similar to Netstat and can report running processes and ports

    • C. 

      It is a remote-control Trojan

    • D. 

      It is a redirector. Remediation link - Cover communications

  • 11. 
    How can a Linux user list which processes are running if he suspects something has been loaded that is not approved?
    • A. 

      Ps

    • B. 

      Echo

    • C. 

      Ls

    • D. 

      Netstat

  • 12. 
    You have been hired by Bob’s Burgers to scan its network for vulnerabilities. They would like you to perform a system-level scan. Which of the following programs should you use?
    • A. 

      N-Stealth

    • B. 

      SARA

    • C. 

      Flawfinder

    • D. 

      Whisker

  • 13. 
    You have been able to get a Terminal window open on a remote Linux host. You now need to use a command-line web browser to download a privilege-escalation tool. Which of the following will work?
    • A. 

      TFTP

    • B. 

      Lynx

    • C. 

      Explorer

    • D. 

      Firefox

  • 14. 
    Which of the following will allow you to set the user to full access, the group to read-only, and all others to no access?
    • A. 

      Chmod 777

    • B. 

      Chroot 740

    • C. 

      Chroot 777

    • D. 

      Chmod 740

  • 15. 
    While hacking away at your roommate’s Linux computer, you accessed his passwd file. Here is what you found.       root :x: 0 : 0 : root: /root : /bin/bash     bin : x : 1 : 1 : bin : /bin :     daemon : x : 2 : 2 : daemon : /sbin : Where is the root password?
    • A. 

      No password has been set

    • B. 

      The password has been shadowed

    • C. 

      The password is not visible because you are not logged in as root

    • D. 

      The password is not in this file; it is in the SAM

  • 16. 
    Your team lead has asked you to make absolute changes to a file’s permissions. Which of the following would be correct?
    • A. 

      Chroot a+rwx

    • B. 

      Chroot 320

    • C. 

      Chmod a+rwx

    • D. 

      Chmod 320

  • 17. 
    Which of the following is not a valid Linux user group?
    • A. 

      Guests

    • B. 

      Normal Users

    • C. 

      System Users

    • D. 

      Super Users

  • 18. 
    You have been exploring the files and directory structure of the new Linux server. What are the entries of the /etc/hosts file made up of?
    • A. 

      The IP addres, the subnet mask, and the default gateway

    • B. 

      The IP address, the hostname, and any alias

    • C. 

      The IP address and status of approved or denied addresses

    • D. 

      The IP address, the mask, and the deny or allow statement

  • 19. 
    At the prompt of your Linux server, you enter cat /etc/passwd. In the following output line, what is the function of 100?chubs : 2cX1eDm8cFiJYc : 500 : 100 : chubs Lex : /home/chubs/bin/bash
    • A. 

      A binary value

    • B. 

      The 100th users created

    • C. 

      The user ID

    • D. 

      The group ID

  • 20. 
    Where will an attacker find the system password file in a Linux machine that is restricted to root and contains encrypted passwords?
    • A. 

      /etc/hosts

    • B. 

      /etc/passwd

    • C. 

      /etc/inetd.conf

    • D. 

      /etc/shadow

  • 21. 
    How many steps are in the ARP process?
    • A. 

      2

    • B. 

      1

    • C. 

      4

    • D. 

      3

  • 22. 
    One of the members of your red team would like to run Dsniff on a span of the network that is composed of hubs. Which of the following type best describes this attack? 
    • A. 

      Passive Sniffing

    • B. 

      MAC Flooding

    • C. 

      ARP Poisoning

    • D. 

      Active Sniffing

  • 23. 
    You have been able to intercept many packets with Wireshark that are addressed to the broadcast address on your network and are shown to be from the web server. The web server is not sending this traffic, so it is being spoofed. What type of attack is the network experiencing?
    • A. 

      Land

    • B. 

      SYN

    • C. 

      Smurf

    • D. 

      Chargen

  • 24. 
    What does the following command in Ettercap do?ettercap -T -q -F cd.ef -M ARP /192.168.13.100
    • A. 

      This command scans for NIC's in promiscuous mode

    • B. 

      The command will detach Ettercap from the console and log all sniffed password

    • C. 

      This command tells Ettercap to do a text mode man-in-the-middle attack

    • D. 

      This command will check to see if someone else is performing ARP poisoning

  • 25. 
    This form of active sniffing is characterized by a large number of packets with bogus MAC addresses.
    • A. 

      MAC flooding

    • B. 

      Passive sniffing

    • C. 

      Active sniffing

    • D. 

      ARP poisoning

Back to Top Back to top