This Network Programming quiz assesses knowledge on tools and techniques used in securing networks. Topics include port scanning, covert communications, and malware identification, equipping learners with practical cybersecurity skills.
Loki
Recub
Girlfriend
FPipe
Rate this question:
A program that appears desirable, but actually contains something harmful
A way of getting into a guarded system without using the required password
A program or algorithm that replicates itself over a computer network and usually performs malicious actions
Sending and receiving unauthorized information or data by using a protocol, service, or server to transmit info in a way in which it was not intended to be used
Rate this question:
Netcat is a more powerful version of Snort and can be used for network monitoring and data acquisition. This program enables you to dump the traffic on a network. It can also be used to print out the headers of packets on a network interface that matches a given expression.
Netcat is called the TCP/IP Swiss army knife. It works with Windows and Linux and can read and write data across network connections using TCP or UDP.
Netcat is called the TCP/IP Swiss army knife. It is a simple Linux-only utility that reads and writes data across network connections using TCP or UDP.
Netcat is called the TCP/IP Swiss army knife. It is a simple windows only utility that reads and writes data across network connections using TCP or UDP.
Rate this question:
SubSeven
Donald Dick
Loki
NetBus
Rate this question:
Restore from a recent backup
Remove any entries from the Windows startup folder
Use a third party tool with a verified fingerprint
Install patch.exe
Rate this question:
It captures all keystrokes entered after the system starts up
It captues login usernames and password that are entered at system startup
It is a hardware keystroke capture program
It's a password trojan that emails password and usernames to a predetermined email address
Rate this question:
Firekiller 2000
ACKCMD
Stealth Tools
Loki
Rate this question:
Forwards email on the remote server to the hacker's computer on port 25
Opens up a netcat listener on the local computer on port 25
Allows the hacker to use a victim's mail server to send spam
Blocks all incoming traffic on port 25
Rate this question:
It is a virus
It is similar to Netstat and can report running processes and ports
It is a remote-control Trojan
It is a redirector. Remediation link - Cover communications
Rate this question:
Ps
Echo
Ls
Netstat
Rate this question:
N-Stealth
SARA
Flawfinder
Whisker
Rate this question:
TFTP
Lynx
Explorer
Firefox
Rate this question:
Chmod 777
Chroot 740
Chroot 777
Chmod 740
Rate this question:
No password has been set
The password has been shadowed
The password is not visible because you are not logged in as root
The password is not in this file; it is in the SAM
Rate this question:
Chroot a+rwx
Chroot 320
Chmod a+rwx
Chmod 320
Rate this question:
Guests
Normal Users
System Users
Super Users
Rate this question:
The IP addres, the subnet mask, and the default gateway
The IP address, the hostname, and any alias
The IP address and status of approved or denied addresses
The IP address, the mask, and the deny or allow statement
Rate this question:
A binary value
The 100th users created
The user ID
The group ID
Rate this question:
/etc/hosts
/etc/passwd
/etc/inetd.conf
/etc/shadow
Rate this question:
2
1
4
3
Rate this question:
Passive Sniffing
MAC Flooding
ARP Poisoning
Active Sniffing
Rate this question:
Land
SYN
Smurf
Chargen
Rate this question:
This command scans for NIC's in promiscuous mode
The command will detach Ettercap from the console and log all sniffed password
This command tells Ettercap to do a text mode man-in-the-middle attack
This command will check to see if someone else is performing ARP poisoning
Rate this question:
MAC flooding
Passive sniffing
Active sniffing
ARP poisoning
Rate this question:
Trinity
DDOSPing
Trinoo
Shaft
Rate this question:
DDOSPing
Shaft
Trinoo
MStream
Rate this question:
Land
Smurf
Stacheldraht
Fraggle
Rate this question:
A large number of SYN packets will appear on the network without the corresponding reply
A large number of ACK packets will appear on the network without the corresponding reply
A large number of SYN ACK packets will appear on the network with-out the corresponding reply
The source and destination port of all the packets will be the same
Rate this question:
Before authentication
Right before the four-step shutdown
After authentication
At the point that the three-step handshake completes
Rate this question:
Option 1
Option 2
Option 3
Option 4
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.