Cyber Quest Final Assessment

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Infoseci
I
Infoseci
Community Contributor
Quizzes Created: 2 | Total Attempts: 944
Questions: 35 | Attempts: 474

SettingsSettingsSettings
Internet Quizzes & Trivia

Questions and Answers
  • 1. 

    Which command would be used to determine that your computer can communicate with another one?

    • A.

      Dir

    • B.

      Ping

    • C.

      Ls

    • D.

      Hello

    Correct Answer
    B. Ping
    Explanation
    The correct answer is "ping". The ping command is used to test the connectivity between two devices on a network. It sends a small packet of data to the specified device and waits for a response. If a response is received, it indicates that the two devices can communicate with each other. Therefore, using the ping command can help determine if your computer can communicate with another one.

    Rate this question:

  • 2. 

    Which of the following is NOT an operating system?

    • A.

      Windows

    • B.

      Linux

    • C.

      Unix

    • D.

      Excel

    Correct Answer
    D. Excel
    Explanation
    Excel is not an operating system because it is a spreadsheet software application developed by Microsoft. It is used for creating, editing, and organizing data in tabular form. Unlike operating systems such as Windows, Linux, and Unix, Excel does not manage hardware resources, provide a user interface, or run other software applications. It is designed for specific tasks related to data analysis and manipulation, rather than serving as a foundational software platform for a computer system.

    Rate this question:

  • 3. 

    Which of the following is a valid, complete, IPv4 address?

    • A.

      34.2.45

    • B.

      44.23.2.45

    • C.

      4.34.300.200

    • D.

      Www.google.com

    Correct Answer
    B. 44.23.2.45
    Explanation
    The correct answer is 44.23.2.45. This is a valid, complete IPv4 address because it consists of four numbers separated by periods, each number ranging from 0 to 255.

    Rate this question:

  • 4. 

    In Linux, what command would you use for determining the files in a directory?

    • A.

      Pwd

    • B.

      Df

    • C.

      Ls

    • D.

      Man

    Correct Answer
    C. Ls
    Explanation
    The "ls" command is used in Linux to list the files and directories in a directory. It provides a detailed view of the contents within a specified directory, including file names, sizes, permissions, and timestamps. By using different options with the "ls" command, users can customize the output to suit their needs, such as displaying hidden files or sorting the output in a specific order.

    Rate this question:

  • 5. 

    What device’s primary purpose is to limit network access?

    • A.

      Router

    • B.

      Switch

    • C.

      Firewall

    • D.

      Gateway

    Correct Answer
    C. Firewall
    Explanation
    A firewall is a device that is primarily designed to limit network access. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. The firewall examines incoming and outgoing network traffic and decides whether to allow or block it based on predetermined security rules. By doing so, it helps protect the network from unauthorized access, malicious attacks, and potential security breaches. Therefore, a firewall is the correct answer as it is specifically designed to limit network access.

    Rate this question:

  • 6. 

    A virtual machine is:

    • A.

      One operating system running in software that is running in another operating system

    • B.

      A computer with no keyboard

    • C.

      A computer connected to the internet

    • D.

      A computer that can boot into multiple operating systems

    Correct Answer
    A. One operating system running in software that is running in another operating system
    Explanation
    A virtual machine refers to the concept of running one operating system within another operating system using virtualization software. This allows for the creation and execution of multiple virtual instances of an operating system on a single physical machine. The virtual machine operates independently from the host operating system and provides a separate environment with its own resources, such as CPU, memory, and storage. This setup enables users to run different operating systems and applications simultaneously, providing flexibility and isolation.

    Rate this question:

  • 7. 

    Which best describes a process in Linux?

    • A.

      A set of executable code

    • B.

      A currently running instance of a program

    • C.

      A collection of files

    • D.

      The location of a file in the file system

    Correct Answer
    B. A currently running instance of a program
    Explanation
    A process in Linux refers to a currently running instance of a program. In Linux, a process is created when a program is executed and it represents the execution of that program. Each process has its own unique process ID (PID) and it can interact with other processes, communicate with the operating system, and perform various tasks. Therefore, out of the given options, "A currently running instance of a program" is the most accurate description of a process in Linux.

    Rate this question:

  • 8. 

    Which of the following is an executable file, given their output from the ls -al command?

    • A.

      -rw-rw-rw- 1 user user 3391 Mar 15 2013 myfile.txt

    • B.

      -rw--r--r-- 1 nobody user 7099 Apr 2 13:58 logfile

    • C.

      Drwxr-xr-x 1 user user 4096 Mar 15 2013 Desktop

    • D.

      -rwxr-xr-x 1 root root 145320 Jun 10 2012 less

    Correct Answer
    D. -rwxr-xr-x 1 root root 145320 Jun 10 2012 less
    Explanation
    The correct answer is "-rwxr-xr-x 1 root root 145320 Jun 10 2012 less". This is an executable file because it has the "x" permission set for the owner, group, and others. The "x" permission allows the file to be executed as a program.

    Rate this question:

  • 9. 

    Which command would you use to make it so a process no longer runs?

    • A.

      Stop

    • B.

      Kill

    • C.

      Man

    • D.

      Ps

    Correct Answer
    B. Kill
    Explanation
    The "kill" command is used to terminate or stop a process from running. It sends a signal to the process, indicating that it should be stopped. This command is commonly used in Unix-like operating systems to forcefully end a process that is not responding or causing issues. By using the "kill" command followed by the process ID, the process can be effectively stopped and removed from the system's memory.

    Rate this question:

  • 10. 

    Processes that are capable of handling requests that come over the network will be listening for requests on:

    • A.

      A user account

    • B.

      A port

    • C.

      A directory

    • D.

      A name

    Correct Answer
    B. A port
    Explanation
    Processes that are capable of handling requests that come over the network will be listening for requests on a port. A port is a communication endpoint that allows different processes on a computer to send and receive data. When a process is listening on a port, it is actively waiting for incoming network requests to be received and processed. By listening on a specific port, the process can establish network connections and communicate with other processes or devices over the network.

    Rate this question:

  • 11. 

    The IPv4 Domain Name System (or DNS) is responsible for:

    • A.

      Mapping ports to processes

    • B.

      Mapping MAC addresses to IP address

    • C.

      Mapping an IP address to a human readable name

    • D.

      Mapping users to computers

    Correct Answer
    C. Mapping an IP address to a human readable name
    Explanation
    The IPv4 Domain Name System (DNS) is responsible for mapping an IP address to a human-readable name. This means that instead of using a series of numbers to access a website or server, the DNS allows us to use domain names such as www.example.com. The DNS acts as a directory that translates these domain names into the corresponding IP addresses, allowing computers to communicate with each other over the internet using recognizable names rather than just numerical addresses.

    Rate this question:

  • 12. 

    Another name for a folder is:

    • A.

      A directory

    • B.

      A file

    • C.

      An IP address

    • D.

      A process

    Correct Answer
    A. A directory
    Explanation
    A folder is a container used to organize files and other folders on a computer's file system. It is also commonly referred to as a directory. Therefore, "a directory" is another name for a folder.

    Rate this question:

  • 13. 

    Which of the following commands will take the output of the ls command and put it in a file name output.txt?

    • A.

      Output.txt < ls

    • B.

      Ls > output.txt

    • C.

      Ls | output.txt

    • D.

      Ls output.txt

    Correct Answer
    B. Ls > output.txt
    Explanation
    The correct answer is "ls > output.txt". This command uses the ">" symbol to redirect the output of the "ls" command into a file named "output.txt". This means that the output of the "ls" command will be saved in the "output.txt" file.

    Rate this question:

  • 14. 

    Which network mask would work for a network that had 200 computers on the same subnet?

    • A.

      255.255.255.0

    • B.

      255.255.255.128

    • C.

      255.255.255.192

    • D.

      255.255.255.252

    Correct Answer
    A. 255.255.255.0
    Explanation
    The network mask 255.255.255.0 would work for a network that had 200 computers on the same subnet because it provides enough host addresses for 256 devices. This means that it can accommodate the 200 computers on the network, leaving some additional addresses available for future expansion or other devices.

    Rate this question:

  • 15. 

    The following is a listing for a file. What are the user/group assignments for this file?   drwxr-xr-x 1 nobody root 4096 Mar 15 2013 Desktop

    • A.

      User of nobody, group of root

    • B.

      User of root, group of nobody

    • C.

      User and group of nobody

    • D.

      User and group of root

    Correct Answer
    A. User of nobody, group of root
    Explanation
    The file "Desktop" has the permissions "drwxr-xr-x", which means it is a directory with read, write, and execute permissions for the owner (user), read and execute permissions for the group, and read and execute permissions for others. The number "1" indicates that there is one link to this directory. The user assignment is "nobody" and the group assignment is "root". Therefore, the correct answer is "user of nobody, group of root".

    Rate this question:

  • 16. 

    In Linux, the top level (or root) directory is:

    • A.

      C:\

    • B.

      /usr

    • C.

      /bin

    • D.

      /

    Correct Answer
    D. /
    Explanation
    The top level (or root) directory in Linux is denoted by a forward slash (/). This is the highest level directory in the file system hierarchy and serves as the starting point for navigating the file system. It contains all other directories and files in the system.

    Rate this question:

  • 17. 

    A common name for the account with full privileges in Linux is:

    • A.

      Nobody

    • B.

      User

    • C.

      Root

    • D.

      Www

    Correct Answer
    C. Root
    Explanation
    In Linux, the account with full privileges is commonly referred to as "root". The root account has the highest level of administrative access and can perform any action on the system, including modifying system files and configurations. It is important to exercise caution when using the root account, as any mistake or malicious action can have severe consequences on the system.

    Rate this question:

  • 18. 

    The command to change your current working directory, to the directory above it is:

    • A.

      Ls ..

    • B.

      Cd ..

    • C.

      Cd

    • D.

      Cd /

    Correct Answer
    B. Cd ..
    Explanation
    The correct answer is "cd ..". This command is used to change the current working directory to the directory above it. The ".." represents the parent directory of the current directory. By using this command, you can navigate up one level in the directory structure.

    Rate this question:

  • 19. 

    Which of the following prefixes is common for encrypted web pages?

    • A.

      Http:

    • B.

      Https:

    • C.

      Ftp:

    • D.

      Smtp:

    Correct Answer
    B. Https:
    Explanation
    The prefix "https:" is commonly used for encrypted web pages. "https" stands for Hypertext Transfer Protocol Secure, which is a secure version of HTTP. It uses encryption to protect the data transmitted between the web server and the user's browser, ensuring that the information cannot be intercepted or tampered with by unauthorized parties. This prefix is commonly used for websites that handle sensitive information, such as online banking, e-commerce, and social media platforms.

    Rate this question:

  • 20. 

    When authenticating a user, which of the following can be used?

    • A.

      Something the user has

    • B.

      Something the user is

    • C.

      Something the user knows

    • D.

      Any of the above

    Correct Answer
    D. Any of the above
    Explanation
    When authenticating a user, any of the above options can be used. This means that the authentication process can involve something the user has, such as a physical token or a smartphone; something the user is, such as biometric data like fingerprints or facial recognition; or something the user knows, such as a password or a PIN. The use of any combination of these factors can enhance the security of the authentication process and help ensure that the user is indeed who they claim to be.

    Rate this question:

  • 21. 

    Which of the following is NOT used to move packets from one computer to another?

    • A.

      Router

    • B.

      Switch

    • C.

      Network attached storage

    • D.

      Gateway

    Correct Answer
    C. Network attached storage
    Explanation
    Network attached storage (NAS) is not used to move packets from one computer to another. NAS is a storage device that provides file-level data storage and is typically used for data backup and sharing files over a network. On the other hand, a router, switch, and gateway are networking devices that are responsible for routing and forwarding packets between different networks or computers.

    Rate this question:

  • 22. 

    Which of the following can be part of securing an operating system?

    • A.

      Applying patches

    • B.

      Applying updates

    • C.

      Applying service packs

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Applying patches, updates, and service packs are all important measures for securing an operating system. Patches are software updates that fix vulnerabilities and bugs in the system. Updates include new features, bug fixes, and security enhancements. Service packs are comprehensive updates that include all previous patches and updates. By applying all of these, the operating system stays up to date with the latest security measures, ensuring protection against potential threats and vulnerabilities.

    Rate this question:

  • 23. 

    A terminal is an example of:

    • A.

      A command line interface

    • B.

      A GUI interface

    Correct Answer
    A. A command line interface
    Explanation
    A terminal is an example of a command line interface because it allows users to interact with a computer system through text-based commands. In a command line interface, users type commands directly into the terminal, which then executes those commands and provides the corresponding output. This differs from a GUI interface, where users interact with the computer system through graphical elements such as icons and menus.

    Rate this question:

  • 24. 

    To remotely determine what services may be running on a server, a common technique is:

    • A.

      To ping the server

    • B.

      Port scanning the server

    • C.

      Getting a directory listing

    • D.

      Opening a file

    Correct Answer
    B. Port scanning the server
    Explanation
    Port scanning the server is a common technique used to remotely determine what services may be running on a server. By scanning the ports of a server, one can identify which ports are open and potentially infer the services that are running on those ports. This information can be valuable for network administrators and security professionals to assess the security posture of a server and identify any potential vulnerabilities that may exist.

    Rate this question:

  • 25. 

    Operating system passwords are generally stored as:

    • A.

      As clear text

    • B.

      Unencrypted

    • C.

      Hashed

    • D.

      Reversibly encrypted

    Correct Answer
    C. Hashed
    Explanation
    Operating system passwords are generally stored as hashed. Hashing is a process that takes the original password and converts it into a fixed-length string of characters using a mathematical algorithm. This hashed value is then stored in the system's database instead of the actual password. Hashing is a one-way function, meaning it is extremely difficult to reverse-engineer the original password from the hashed value. This provides an added layer of security as even if the database is compromised, the attacker would not have access to the actual passwords.

    Rate this question:

  • 26. 

    Which of the following tools could be used to sniff network traffic?

    • A.

      Wireshark

    • B.

      Nmap

    • C.

      Ping

    • D.

      Owasp

    Correct Answer
    A. Wireshark
    Explanation
    Wireshark is a powerful tool that can be used to sniff network traffic. It allows users to capture and analyze network packets, providing detailed information about the data being transmitted over the network. Wireshark is commonly used by network administrators and security professionals to troubleshoot network issues, monitor network activity, and detect any malicious or suspicious behavior. It provides a comprehensive view of network traffic, including protocols, source and destination IP addresses, and even the content of individual packets, making it an essential tool for network analysis and troubleshooting.

    Rate this question:

  • 27. 

    The TCP three way handshake consists of the following flags being set in the TCP packets:

    • A.

      FIN; FIN/ACK; ACK

    • B.

      SYN; SYN; SYN

    • C.

      ACK; ACK; ACK

    • D.

      SYN; SYN/ACK; ACK

    Correct Answer
    D. SYN; SYN/ACK; ACK
    Explanation
    The correct answer is SYN; SYN/ACK; ACK. The TCP three-way handshake is the process used by TCP to establish a connection between two devices. It begins with the client sending a SYN (synchronize) packet to the server. The server responds with a SYN/ACK (synchronize/acknowledge) packet, indicating that it received the SYN packet and is willing to establish a connection. Finally, the client sends an ACK (acknowledge) packet to acknowledge the receipt of the SYN/ACK packet. This three-step process ensures that both the client and server are ready to communicate and establishes a reliable connection.

    Rate this question:

  • 28. 

    The privileged TCP ports are:

    • A.

      Less than 1024

    • B.

      Greater than 1024

    • C.

      Divisible by 2

    • D.

      Greater than 65535

    Correct Answer
    A. Less than 1024
    Explanation
    Privileged TCP ports are ports that are reserved for specific services and require special privileges to use. These ports are typically well-known ports used by common services such as HTTP (port 80) or FTP (port 21). In the TCP/IP protocol, port numbers range from 0 to 65535. Ports less than 1024 are considered privileged because they are reserved for system services and applications that require administrative access. Therefore, the correct answer is "less than 1024".

    Rate this question:

  • 29. 

    To make it harder to determine what an attacker is doing, the attacker will often:

    • A.

      Delete log files

    • B.

      Install rootkits

    • C.

      Kill logging processes

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    To make it harder to determine what an attacker is doing, they will often employ multiple tactics. Deleting log files helps to cover their tracks by removing any evidence of their activities. Installing rootkits allows the attacker to gain unauthorized access and control over a compromised system, making it easier for them to hide their actions. Killing logging processes prevents any further logging of their activities, further obscuring their presence. Therefore, all of the mentioned actions are commonly employed by attackers to increase the difficulty of detection and investigation.

    Rate this question:

  • 30. 

    Encrypt The message "THE HACKER IS NEAR" using the Caesar Cipher system below:   Standard Alphabet: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z   Caesar Alphabet: X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

    • A.

      KBXO FP EXZHBO QEB

    • B.

      THE HACKER IS NEAR

    • C.

      QEB EXZHBO FP KBXO

    • D.

      THE EXZHBO IS NEAR

    Correct Answer
    C. QEB EXZHBO FP KBXO
    Explanation
    The given answer "QEB EXZHBO FP KBXO" is the encrypted form of the message "THE HACKER IS NEAR" using the Caesar Cipher system. In this system, each letter in the message is replaced with the corresponding letter from the Caesar Alphabet, which is shifted by three positions to the left compared to the Standard Alphabet. Therefore, "T" becomes "Q", "H" becomes "E", "E" becomes "B", and so on. Thus, the message "THE HACKER IS NEAR" is encrypted as "QEB EXZHBO FP KBXO".

    Rate this question:

  • 31. 

    If we want to monitor web traffic, what information is useful? 

    • A.

      Source IP Address

    • B.

      Destination Port

    • C.

      Destination Address

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    To effectively monitor web traffic, it is essential to gather information about the source IP address, destination port, and destination address. The source IP address helps in identifying the origin of the traffic, allowing for tracking and analysis. The destination port indicates the specific service or application being accessed, aiding in understanding the nature of the traffic. The destination address provides insight into the intended recipient of the traffic, enabling the identification of potential patterns or anomalies. Collectively, having all of this information allows for comprehensive monitoring and analysis of web traffic.

    Rate this question:

  • 32. 

    What protocol can cause a USB device to overwrite a host system’s memory?

    • A.

      DMA

    • B.

      IPSec

    • C.

      SSL

    • D.

      SMTP

    Correct Answer
    A. DMA
    Explanation
    DMA stands for Direct Memory Access. It is a protocol that allows peripheral devices, such as USB devices, to directly access the host system's memory without involving the CPU. In certain cases, if a USB device is compromised or malicious, it can use DMA to overwrite the host system's memory, potentially causing damage or unauthorized access. Therefore, DMA is the protocol that can cause a USB device to overwrite a host system's memory.

    Rate this question:

  • 33. 

    What is the name of the attack that uses a memory overwrite:

    • A.

      Race Condition

    • B.

      Buffer Overflow

    • C.

      Password Attack

    • D.

      Man In The Middle

    Correct Answer
    B. Buffer Overflow
    Explanation
    Buffer Overflow is the correct answer because it refers to the attack that occurs when a program or process tries to store more data in a buffer than it can hold, causing the excess data to overwrite adjacent memory. This can lead to the execution of malicious code or the crashing of the system.

    Rate this question:

  • 34. 

    When the attacker captures information from the client, then forwards it on to the intended server, the attacker is performing a/an:

    • A.

      Man-in-the-middle attack

    • B.

      Social Engineering

    • C.

      Warchalking

    • D.

      Buffer Overflow

    Correct Answer
    A. Man-in-the-middle attack
    Explanation
    A man-in-the-middle attack occurs when an attacker intercepts communication between a client and a server, capturing information from the client and forwarding it to the intended server. This allows the attacker to eavesdrop on the communication, potentially stealing sensitive information such as login credentials or financial data. The attacker can also modify the data being transmitted, leading to unauthorized access or manipulation of the communication.

    Rate this question:

  • 35. 

    To sniff traffic on an Ethernet network, the attacker will usually need to use which of the following attacks:

    • A.

      Buffer Overflow

    • B.

      ARP spoofing

    • C.

      Denial of Service

    • D.

      SQL Injection

    Correct Answer
    B. ARP spoofing
    Explanation
    To sniff traffic on an Ethernet network, the attacker will usually need to use ARP spoofing. ARP spoofing involves sending fake Address Resolution Protocol (ARP) messages to the network, tricking the network devices into associating the attacker's MAC address with the IP address of the target. By doing so, the attacker can intercept and monitor the network traffic passing between the target and other devices, gaining unauthorized access to sensitive information. This attack allows the attacker to eavesdrop on the network without being detected.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 30, 2014
    Quiz Created by
    Infoseci
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.