The Ultimate Fundamentals of Networking Test assesses essential security concepts within network environments. It covers DMZ purposes, intrusion detection, password salting, vulnerability scanning, and risks of third-party scripts, catering to learners aiming to enhance their network security skills.
IDLE/IPID Scanning
Banner Grabbing
UDP Scanning
SSDP Scanning
Rate this question:
NTP
PPP
TimeKeeper
OSPF
Rate this question:
Snort
Nmap
Cain & Able
Nessus
Rate this question:
Grey-box
White-box
Black-box
Announced
Rate this question:
Social engineering, company site browsing, tailgating
Phishing, spamming, sending trojans
Port scanning, banner grabbing, service identification
Wardriving, warchalking, social engineering
Rate this question:
Dynamic Testing
Function Testing
Fuzzing Testing
Static Testing
Rate this question:
Just normal call from Microsoft Cyberdivision
Social Engineering Attack
Tailgating
Piggybacking
Rate this question:
Security Incident and Event Monitoring
Intrusion Prevention Server
Vulnerability Scanner
Network Sniffer
Rate this question:
A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a vulnerability scan does not typically involve active exploitation.
Vulnerability scans only do host discovery and port scanning by default.
The tools used by penetration testers tend to have much more comprehensive vulnerability databases.
It is not - a penetration test is often performed by an automated tool, while a vulnerability scan requires active engagement.
Rate this question:
Netstat
Net use connection
Netsh
Net use
Rate this question:
System Hacking
Enumeration
Scanning
Footprinting
Rate this question:
To only provide direct access to the nodes within the DMZ and protect the network behind it
To provide a place to put the honeypot
To scan all traffic coming through the DMZ to the internal network
To contain the network devices you wish to protect
Rate this question:
Vulnerabilities in the application layer are greatly different from IPv4
Due to the extensive security measures built in IPv6, application layer vulnerabilities need not be addressed
Vulnerabilities in the application layer are independent of the network layer. Attacks and mitigation techniques are almost identical.
Implementing IPv4 security in a dual-stack network offers protection from IPv6 atttacks too.
Rate this question:
Investigation
Exploration
Enumeration
Reconnassance
Rate this question:
FIN
IDLE (side-channel)
SYN
XMAS
Rate this question:
This is not possible without installing third-party software, since Windows only allows changing firewall settings for individual applications.
A rule matching these requirements can be created in "Windows Firewall with Advanced Security", located in the Control Panel.
The only way to implement a specific rule like this is to use the "netsh" program on the command-line.
The firewall rule must be added from within the application that is using that port.
Rate this question:
He already has admin privileges, as shown by the "501" at the end of the SID.
He needs to disable antivirus protection.
He needs to gain physical access.
He must perform privilege escalation.
Rate this question:
Winpsw
Winprom
Libpcap
Winpcap
Rate this question:
Digest
Secret Key
Public Key
Hash Algorithm
Rate this question:
Finding new exploits which can be used during the pentest
Ensuring that his activity will be authorized and he will have proper agreement with owners of targeted system
Creating action plan
Preparing a list of targeted systems
Rate this question:
Gray-Hat Hacker
Script Kiddies
White-Hat Hackers
Black-Hat Hackers
Rate this question:
Checking if the remote host is alive
TCP / UDP Port Scanning
Firewall detection
OS detection
Rate this question:
Collision
Rainbow tables
Brute force
Decryption
Rate this question:
Denial-of-Service attack targeting 192.168.0.105
Teardrop attack targeting 192.168.0.110
Port scan targeting 192.168.0.110
Port scan targeting 192.168.0.105
Rate this question:
Msfencode
Msfpayload
Msfcli
Msfd
Rate this question:
None of them
Session Hijacking
Phishing
Tailgating
Rate this question:
Exclamation mark
Semicolon
Double quote
Single quote
Rate this question:
Relational, Hierarchical
Strict, Abstract
Simple, Complex
Hierarchical, Relational
Rate this question:
MyDoom
LOIC
R-U-Dead-Yet? (RUDY)
Stacheldraht
Rate this question:
Confidentiality, Integrity, Availability
Authenticity, Integrity, Non-repudiation
Authenticity, Confidentiality, Integrity
Availability, Nonrepudiation, Confidentiality
Rate this question:
Union-based SQL injection
Blind SQL injection
Error-based SQL injection
NoSQL injeciton
Rate this question:
Degauss the backup tapes and transport them in a lock box.
Encrypt the backup tapes and use a courier to transport them.
Encrypt the backup tapes and transport them in a lock box.
Hash the backup tapes and transport them in a lock box.
Rate this question:
Network Sniffer
Intrusion Prevention Server
Vulnerability Scanner
Security Incident and Event Monitoring
Rate this question:
Advanced Persistent Threats
Rootkit Attack
Botnet Attack
Spear Phishing Attack
Rate this question:
If (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 443) then permit
If (source matches 10.10.10.0 and destination matches 10.20.20.1 and port matches 443) then permit
If (source matches 10.20.20.1 and destination matches 10.10.10.0/24 and port matches 443) then permit
If (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 80 or 443) then permit
Rate this question:
This is most probably true positive which triggered on secure communication between client and server.
This is most probably false-positive because IDS is monitoring one direction traffic.
This is most probably false-positive, because an alert triggered on reversed traffic.
This is probably true negative.
Rate this question:
Asymmetric cryptography is computationally expensive in comparison. However, it's well-suited to securely negotiate keys for use with symmetric cryptography.
Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
Symmetric encryption allows the server to securely transmit the session keys out-of-band.
Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
Rate this question:
External scripts increase the outbound company data traffic which leads to greater financial losses
External scripts have direct access to the company servers and can steal the data from there
External script contents could be maliciously modified without the security team knowledge
There is no risk at all as the marketing services are trustworthy
Rate this question:
Kernel based patches
Static MAC Entries
Arpwatch
Secure ARP Protocol
Rate this question:
Http://www.tucowsdomains.com/whois
Https://whois.arin.net
Https://www.networksolutions.com/whois
Https://www.godaddy.com/whois
Rate this question:
The firewall rule must be added from within the application that is using that port.
This is not possible without installing third-party software, since Windows only allows changing firewall settings for individual applications.
The only way to implement a specific rule like this is to use the "netsh" program on the command-line.
A rule matching these requirements can be created in "Windows Firewall with Advanced Security", located in the Control Panel.
Rate this question:
Both are asymmetric algorithms, but RSA uses 1024-bit keys
Both are symmetric algorithms, but AES uses 256-bit
RSA is asymmetric, which is used to create a public/private key pair; AES is symmetric, which is used to encrypt data
AES is asymmetric, which is used to create a public/private key pair; RSA is symmetric, which is used to encrypt data
Rate this question:
No return response
RST
ACK
SYN
Rate this question:
Information security awareness training
Warning to those who write password on a post it note and put it on his/her desk
Conducting a one to one discussion with the other employees about the importance of information security
Developing a strict information security policy
Rate this question:
Internal network
DMZ network
Isolated vlan network
Mesh network
Rate this question:
Email Spoofing
Email Masquerading
Email Harvesting
Email Phishing
Rate this question:
Nmap -sT -O -T0
Nmap -sP -p-65535 -T5
Nmap -A -Pn
Nmap -A —host-timeout 99 -T1
Rate this question:
Network based IDS
Gateway based IDS
Host based IDS
Open source based IDS
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.