The 'Ethicalquiz' explores key aspects of IPv6, including its datagram header length, address types, and differences from IPv4. It also touches on general networking concepts like firewalls and private IP addresses, enhancing understanding of modern network security and architecture.
Send specifically crafted packets by manipulating TCP headers and flags
Perform a brute force attack
Perform a SQL injection attack
None of the above
Rate this question:
/bin
/etc
/sbin
/sec
Rate this question:
IDS
Packet sniffer
Packet logger
All of the above
Rate this question:
AirPcap
Honeypot
Access point
Router
Rate this question:
S-1-5- and end with -500
S-1-0-0
S-1-1-0
S-1-3-1
Rate this question:
Gaining access
Fingerprinting
Social engineering
Reconnaissance
Rate this question:
Hex dump
Ascii dump
Octal dump
Dec dump
Rate this question:
Daemon
Database
Client
Agent
Rate this question:
Heap-based overflow
Buffer overflow
Stack-based overflow
SQL injection
Rate this question:
They corrupt data
They destroy cryptographic keys in the TPM
They provide low-level formatting operations
They provide remote access to the client
Rate this question:
Brute force
Hashing
Dictionary attack
Social engineering
Rate this question:
Configuring a strong SSID is a vital step in securing your network
An SSID should always be more than eight characters in length
An SSID should never be a dictionary word or anything easily guessed
SSIDs are important for identifying networks, but do little to nothing for security
Netstat
Ps
Ls
Echo
Rate this question:
They route traffic based upon inspecting packets.
They filter traffic based upon inspecting packets.
They switch packets based upon inspecting packets.
They forward packets to the Internet based upon inspecting packets.
Rate this question:
Active, inactive, standby
Open, half-open, closed
Open, filtered, unfiltered
Active, closed, unused
Rate this question:
AES
DES
RSA
MD-5
Rate this question:
Keeping track of Ethernet/IP addressing pairing
Packet filtering
Encryption
DNS security
Rate this question:
Enables DNS spoofing
Verifies zone security
Performs a zone transfer
Resets the DNS cache
Rate this question:
123
423
112
808
Rate this question:
DEP
ASLR
Virtual memory
Memory protection mechanism
Rate this question:
Fuzzing
Penetration test
MAC Spoofing
Port Mirroring
Rate this question:
White box
Grey box
Black box
Glass box
Rate this question:
Compmgmt.msc
Compmgmt.mc
Pcmgmt.mc
Pcmgmt.msc
Rate this question:
Replay Attacks
DDoS
DoS
Virus attack
Rate this question:
Nmap XML output
Performs a script scan using the default set of scripts
A script scan without host discover or a port scan
Requests that normal output be directed to the given filename
Rate this question:
Ipconfig
Tracert
Nslookup
Wireshark
Rate this question:
No, because it does not contain any links or attachments
No, because it addresses the user by his actual name
No, because it comes from the IT department and contains information
Yes, because it contains an urgent request for sensitive information
Rate this question:
Fragmentation field
Fast switching
TOS field
Option field
Rate this question:
Residual risk
Accepted risk
Return On Investment (ROI)
Vulnerability
Rate this question:
Active reconnaissance
Passive reconnaissance
Vulnerability scanning
OS fingerprinting
Rate this question:
Spyware
Rootkit
Adware
Trojan
Rate this question:
Immediately report this finding to the administrator
Ignore this finding as irrelevant and continue testing
Attempt to access the accounts
Include this finding in the final report
Rate this question:
10 bytes
25 bytes
30 bytes
40 bytes
Rate this question:
Whois
Nslookup
Dig
Traceroute
Rate this question:
NTP
SNMP
POP3
SMTP
Rate this question:
Machine A: netcat -l -p -s password 1234 < secretfile Machine B: netcat 1234
Machine A: netcat -l -e magickey -p 1234 < secretfile Machine B: netcat 1234
Machine A: netcat -l -p 1234 < secretfile -pw password. Machine B: netcat 1234 -pw password
Use cryptcat instead of netcat
The encryption algorithm, which is RC4
The initalization vector (IV)
The password
The username and password
Rate this question:
-sl
-ls
-Si
None, because Nmap does not support idle scans
Rate this question:
Sudo tshark -f "net 192.168.8.0/24"
Sudo tshark -Y "ip.addr == 192.168.8.244"
Sudo tshark -f "net 192.168.8.0 mask 255.255.255.0"
None, because tshark does not support traffic capturing
Rate this question:
Secure configuration management and Bob should document why the change was made without proper change control
Logical access control and Bob should document why the change was made without proper change control
Physical security and Bob should document the change in change control document
SDLC and Bob should document the change in change control document
Rate this question:
Host scanning
Passive information gathering
Analysis of host scanning
Network level discovery
Rate this question:
The MAC address doesn’t map to a manufacturer.
The MAC address is two digits too long.
A reverse ARP request maps to two hosts.
The host is receiving its own traffic.
Rate this question:
Wikto
N-stealth
WinPcap
Ncat
Rate this question:
Nmap -sT 192.168.1.0/24 -T0
Nmap -sX 192.168.1.0/24 -T0
Nmap -sO 192.168.1.0/24 -T0
Nmap -sS 192.168.1.0/24 -T0
Rate this question:
Tracking
Breaking into a device
Sending unsolicited messages
Crashing
Rate this question:
1
2
3
4
Rate this question:
WinPcap
Libcap
Promiscuous mode
Msfenocde
Rate this question:
LACNIC
ARIN
APNIC
AfriNIC
Rate this question:
Quiz Review Timeline (Updated): Jan 8, 2025 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.