SlideShare a Scribd company logo
1) Which of the following are Penetration testing methodology?
A. White box model
B. Black box model
C. Gray box model
D. All of the above
2) Which of the following skills are needed to be a security
tester?
A. Knowledge of network and computer technology
B. Ability to communicate with management and IT personnel
C. An understanding of the laws in your location and ability to
use necessary tools
D. All of the above
3) Which of the following are the district layer of TCP/IP?
A. Network and Internet
B. Transport and Application
C. Network, Internet, Transport, Presentation
D. A and B
4) Which of the followings are the TCP segment flags?
A. SYN flag: synch flag , ACK flag: acknowledgment flag
B. PSH flag: push flag, URG flag: urgent flag, STF flag: set test
flag
C. PSH flag: push flag, URG flag: urgent flag, RST flag: reset
flag, FIN flag: finish flag
D. A and C
5) Which of the following are properties of User Datagram
Protocol (UDP)?
A. Fast but unreliable delivery protocol and Operates on
Transport layer
B. Used for speed but Does not need to verify receiver is
listening or ready
C. Depends on higher layers of TCP/IP stack handle problems
and Referred to as a connectionless protocol
D. All of the above
6) Distributed denial-of-service (DDoS) attack is:
A. Attack on host from single servers or workstations and
Network could be flooded with billions of packets that causes
Loss of bandwidth and Degradation or loss of speed
B. Attack on host from multiple servers or workstations and
Network could be flooded with billions of packets that causes
Loss of bandwidth and Degradation or loss of speed
C. Attack on server from multiple host or workstations and
Network could be flooded with billions of packets causes Loss
of bandwidth and Degradation or loss of speed
D. None of the above
7) Different categories of Attacks are:
A. Denial-of-Service (DoS), Distributed Denial-of-Service
(DDoS), Buffer overflow
B. Ping of Death, Session hijacking
C. Denial-of-Service (DoS), Distributed Denial-of-Service
(DDoS), Buffer overflow, Ping of Death, Port High jacking
(PoH)
D. A and B
8) Which of the following are Social Engineering Tactics?
A. Persuasion, Intimidation, Coercion
B. Persuasion, Intimidation, Coercion, Extortion, blackmailing
C. Persuasion, Intimidation, Coercion, Extortion, Urgency
D. All of the above
9) Which of the following/s are types of Port Scans?
A. ACK scan, FIN scan, UDP scan
B. SYN scan, NULL scan, XMAS scan,
C. ACK scan, FIN scan, UDP scan, SYN scan, NULL scan,
XMAC scan
D. A and B
10) Enumeration extracts information about:
A. Resources or shares on the network
B. Usernames or groups assigned on the network
C. User’s password and recent logon times
D. All of the above
11) Which of the following are NetBIOS Enumeration Tools?
A. Nbtstat command, Net view command, Net use command
B. Nbtstat command, Net view command, Dumpsec command
C. Nbtstat command, Net view command, Hyena command
D. None of the above
12) Dumsec is an Enumeration tool for Windows systems that
does the following/s:
A. Allows user to connect to a server and “dump”, Permissions
for shares, Permissions for printers
B. Permissions for the Registry, Users in column or table
format, Policies ,Rights, Services
C. Allows user to connect to a server and “dump”, Permissions
for shares, Permissions for printers and Permissions for the
Registry, Users in column or table format
D. A and B
13) Which of the following are Tools for enumerating Windows
targets?
A. Nbtstat, Net view, Net use
B. Nbtstat, Net view, Net use and Other utilities
C. Nbtstat, Net view, Net use, Nessus
D. All of the above
14) Which of the following statements is more accurate about
Windows OS?
A. Many Windows OSs have serious vulnerabilities
B. None of the Windows OSs have any serious vulnerabilities
C. A few Windows OSs have any serious vulnerabilities
D. All of the Windows OSs have any serious vulnerabilities
15) Which of the following best describes Remote Procedure
Call?
A. Allows a program running on one host to run code on a
remote host
B. Allows a program running on one server to run code on
another server
C. Allows a program running any server to run code on a
designated clinet
D. None of the above
16) Buffer Overflows occurs when:
A. Data is written to a buffer and corrupts data in memory next
to allocated buffer
B. Normally, occurs when copying strings of characters from
one buffer to another
C. Data is deleted from a buffer and corrupts data in memory
next to deleted buffer
D. A and B
17) Microsoft Baseline Security Analyzer (MBSA) is capable of
checking which of the following/s?
A. Patches, Security updates, Configuration errors
B. Blank or weak passwords
C. A and B
D. None of the above
18) Which of the following/s are Vulnerabilities in Windows
file systems?
A. Lack of ACL support in FAT and Risk of malicious ADSs in
NTFS
B. RCP, NetBIOS, SMB, Null sessions
C. Windows Web services and IIS
D. All of the above
19) An Embedded system is:
A. Any computer system that is a general-purpose PC or server
and they are in all networks and Perform essential functions
B. Any computer system that isn’t a general-purpose PC or
server and they are in all networks and Perform essential
functions
C. Any computer system that isn’t a server or client
D. None of the above
20) Object Linking and Embedding Database are Set of
interfaces that:
A. Enable applications to access data stored in DBMS and relies
on connection strings and allows application to access data
stored on external device
B. Enable applications to access data stored in a server and
relies on connection tokens and allows application to access
data stored on external device
C. Enable applications to access data stored in flat files
D. All of the above
21) ActiveX Data Objects are:
A. Programming interface for connecting Web applications to a
database
B. Defines a set of technologies that allow desktop applications
to interact with Web
C. Network interface for connecting Web applications to a
database
D. A and B
22) Attackers controlling a Web server can do which of the
following/s?
A. Deface the Web site and destroy company’s database or sell
contents
B. Gain control of user accounts and perform secondary attacks
C. Gain root access to other application servers
D. All of the above
23) Which of the following/s are Web application
vulnerabilities?
A. Cross-site scripting (XSS) flaws and Injection flaws and
malicious file execution and Unsecured direct object reference
B. Cross-site request forgery (CSRF) and Information leakage
and incorrect error handling and Broken authentication and
session management
C. Unsecured cryptographic storage and Unsecured
communication and Failure to restrict URL access
D. All of the above
24) Which of the following statements best describes Wireless
Hacking?
A. Hacking a wireless network is different from hacking a wired
Lan and Port scanning and Enumeration techniques can not be
used.
B. Hacking a wireless network is not much different from
hacking a wired LAN and Port scanning and Enumeration
techniques can be used.
C. Hacking a wireless network is not much different from
hacking a wired LAN and Port scanning technique can be used
D. All of the above
25) Cryptography is:
A. Process of converting plaintext into ciphertext
B. Process of converting ciphertext into plaintext
C. Process of converting plaintext into ciphertext and vise
versa
D. All of the above
26) Which of the following statements is true?
A. Cryptography is a new technology
B. Cryptography has been around for thousands of years
C. Cryptography has been around for hundreds of years
D. None of the above
27) Which of the following best describes Hashing Algorithms?
A. Takes a variable-length message and produces a fixed-length
value (i.e., message digest), Like a fingerprint of the message
B. Takes a variable-length message and produces a fixed-length
value (i.e., message digest), Like a fingerprint of the message,
If message is changed, hash value changes
C. Takes a fixed-length message and produces a variable-length
value (i.e., message digest), Like a fingerprint of the message,
If message is changed, hash value changes
D. B and C
1. Who’s responsible for the ad? Look for the logo, which is the
symbol representing the brand. When you find it,
ask yourself what you know about the brand. Do you like it?
Does it have a good reputation? In this case, Zed is
responsible for this ad. It’s the company that picked everything
in the ad to convince you to buy its products.
2. What is the ad actually saying? Remember to look at more
than words. Everything in an ad is a message to you:
the pictures, the colors, the feel – and the words. In this ad, you
could find a bunch of messages: if you wear Zed
clothes, you’ll be hip; you can dress well for not a lot of money;
if you buy these new, stylish clothes, you won’t
feel guilty; if you wear these clothes; you’ll be happy and have
cool friends; if you buy Zed, you’ll be cool like
these kids. Basically, whatever you think the ad is saying to you
is right.
3. What does the ad want me to do? Buy clothes from Zed.
4. Who do you think this ad is for? Probably girls, maybe ages
12-20.
5. What do you see that makes you think that? The pictures of
high school or college girls (though there are two guys,
so they may sell guy’s clothes, too). And the logo has a kind of
flowery pattern, which might be more for girls.
Federal Trade Commission
ftc.gov
1. Who’s responsible for this ad?
2. What is the ad actually saying?
3. What does the ad want me to do?
4. Who is the ad for?
5. What do you see that makes you
think that?
Now it’s your turn
Answer these questions to deconstruct this ad:
1) Which of the following are Penetration testing methodology  .docx

More Related Content

Similar to 1) Which of the following are Penetration testing methodology .docx

Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
elbanglis
 
Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-test
stacio
 
Laudon traver ec11-tif_ch03
Laudon traver ec11-tif_ch03Laudon traver ec11-tif_ch03
Laudon traver ec11-tif_ch03
BookStoreLib
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
bunyansaturnina
 
Monitoring Team Quastionnaire.docx
Monitoring Team Quastionnaire.docxMonitoring Team Quastionnaire.docx
Monitoring Team Quastionnaire.docx
chinna577868
 
Security (IP)
Security (IP)Security (IP)
Security (IP)
Tanat Tonguthaisri
 
Question for Information Communication Technology quiz bee.docx
Question for Information Communication Technology quiz bee.docxQuestion for Information Communication Technology quiz bee.docx
Question for Information Communication Technology quiz bee.docx
moigarcia2
 
1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf
isenbergwarne4100
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exambubyslyke
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examginistays
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examgiquickly
 
CEHv8 practice Exam with key
CEHv8 practice Exam with keyCEHv8 practice Exam with key
CEHv8 practice Exam with key
JahaSoft
 
312 50-demo
312 50-demo312 50-demo
312 50-demo
Tomas Vileikis
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Yazeed Khalid
 
Bis 220 Final Exam
Bis 220  Final Exam Bis 220  Final Exam
Bis 220 Final Exam
heightly
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%sharing3444
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%singup22
 

Similar to 1) Which of the following are Penetration testing methodology .docx (20)

Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
 
Bit%20 ch02
Bit%20 ch02Bit%20 ch02
Bit%20 ch02
 
Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-test
 
Laudon traver ec11-tif_ch03
Laudon traver ec11-tif_ch03Laudon traver ec11-tif_ch03
Laudon traver ec11-tif_ch03
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
 
Cn
CnCn
Cn
 
Monitoring Team Quastionnaire.docx
Monitoring Team Quastionnaire.docxMonitoring Team Quastionnaire.docx
Monitoring Team Quastionnaire.docx
 
Security (IP)
Security (IP)Security (IP)
Security (IP)
 
Ui certification q&a
Ui certification q&aUi certification q&a
Ui certification q&a
 
Question for Information Communication Technology quiz bee.docx
Question for Information Communication Technology quiz bee.docxQuestion for Information Communication Technology quiz bee.docx
Question for Information Communication Technology quiz bee.docx
 
1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
CEHv8 practice Exam with key
CEHv8 practice Exam with keyCEHv8 practice Exam with key
CEHv8 practice Exam with key
 
312 50-demo
312 50-demo312 50-demo
312 50-demo
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
 
Bis 220 Final Exam
Bis 220  Final Exam Bis 220  Final Exam
Bis 220 Final Exam
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 

More from SONU61709

Please respond to the followingAnalyze ONE of the Neo-Piageti.docx
Please respond to the followingAnalyze ONE of the Neo-Piageti.docxPlease respond to the followingAnalyze ONE of the Neo-Piageti.docx
Please respond to the followingAnalyze ONE of the Neo-Piageti.docx
SONU61709
 
Please respond to the followingBased on the discussion prepar.docx
Please respond to the followingBased on the discussion prepar.docxPlease respond to the followingBased on the discussion prepar.docx
Please respond to the followingBased on the discussion prepar.docx
SONU61709
 
Please respond to the following in an approx. 5-6 page paper, double.docx
Please respond to the following in an approx. 5-6 page paper, double.docxPlease respond to the following in an approx. 5-6 page paper, double.docx
Please respond to the following in an approx. 5-6 page paper, double.docx
SONU61709
 
Please respond to the followingImagine you have recently .docx
Please respond to the followingImagine you have recently .docxPlease respond to the followingImagine you have recently .docx
Please respond to the followingImagine you have recently .docx
SONU61709
 
Please respond to one (1) the followingRead the article e.docx
Please respond to one (1) the followingRead the article e.docxPlease respond to one (1) the followingRead the article e.docx
Please respond to one (1) the followingRead the article e.docx
SONU61709
 
Please respond to the followingResearch on the Internet a rec.docx
Please respond to the followingResearch on the Internet a rec.docxPlease respond to the followingResearch on the Internet a rec.docx
Please respond to the followingResearch on the Internet a rec.docx
SONU61709
 
Please respond to Question One (bolded) and one additional ess.docx
Please respond to Question One (bolded) and one additional ess.docxPlease respond to Question One (bolded) and one additional ess.docx
Please respond to Question One (bolded) and one additional ess.docx
SONU61709
 
Please respond to the following in a substantive post (3–4 paragraph.docx
Please respond to the following in a substantive post (3–4 paragraph.docxPlease respond to the following in a substantive post (3–4 paragraph.docx
Please respond to the following in a substantive post (3–4 paragraph.docx
SONU61709
 
Please respond to the followingDebate if failing to reje.docx
Please respond to the followingDebate if failing to reje.docxPlease respond to the followingDebate if failing to reje.docx
Please respond to the followingDebate if failing to reje.docx
SONU61709
 
Please respond to the followingCharts and graphs are used.docx
Please respond to the followingCharts and graphs are used.docxPlease respond to the followingCharts and graphs are used.docx
Please respond to the followingCharts and graphs are used.docx
SONU61709
 
Please respond to the followingAppraise the different approac.docx
Please respond to the followingAppraise the different approac.docxPlease respond to the followingAppraise the different approac.docx
Please respond to the followingAppraise the different approac.docx
SONU61709
 
Please respond to the following discussion with a well thought out r.docx
Please respond to the following discussion with a well thought out r.docxPlease respond to the following discussion with a well thought out r.docx
Please respond to the following discussion with a well thought out r.docx
SONU61709
 
Please respond to each classmate if there is a need for it and als.docx
Please respond to each classmate if there is a need for it and als.docxPlease respond to each classmate if there is a need for it and als.docx
Please respond to each classmate if there is a need for it and als.docx
SONU61709
 
please respond to both discussion in your own words in citation plea.docx
please respond to both discussion in your own words in citation plea.docxplease respond to both discussion in your own words in citation plea.docx
please respond to both discussion in your own words in citation plea.docx
SONU61709
 
please respond In your own words not citations1. The Miami blu.docx
please respond In your own words not citations1. The Miami blu.docxplease respond In your own words not citations1. The Miami blu.docx
please respond In your own words not citations1. The Miami blu.docx
SONU61709
 
Please respond in 300 words the followingWe see SWOT present.docx
Please respond in 300 words the followingWe see SWOT present.docxPlease respond in 300 words the followingWe see SWOT present.docx
Please respond in 300 words the followingWe see SWOT present.docx
SONU61709
 
Please respond to the followingReflect on the usefulness .docx
Please respond to the followingReflect on the usefulness .docxPlease respond to the followingReflect on the usefulness .docx
Please respond to the followingReflect on the usefulness .docx
SONU61709
 
Please respond to the followingLeadership talent is an or.docx
Please respond to the followingLeadership talent is an or.docxPlease respond to the followingLeadership talent is an or.docx
Please respond to the followingLeadership talent is an or.docx
SONU61709
 
Please respond to the followingHealth care faces critic.docx
Please respond to the followingHealth care faces critic.docxPlease respond to the followingHealth care faces critic.docx
Please respond to the followingHealth care faces critic.docx
SONU61709
 
Please respond to the followingMNCs, IOs, NGOs, and the E.docx
Please respond to the followingMNCs, IOs, NGOs, and the E.docxPlease respond to the followingMNCs, IOs, NGOs, and the E.docx
Please respond to the followingMNCs, IOs, NGOs, and the E.docx
SONU61709
 

More from SONU61709 (20)

Please respond to the followingAnalyze ONE of the Neo-Piageti.docx
Please respond to the followingAnalyze ONE of the Neo-Piageti.docxPlease respond to the followingAnalyze ONE of the Neo-Piageti.docx
Please respond to the followingAnalyze ONE of the Neo-Piageti.docx
 
Please respond to the followingBased on the discussion prepar.docx
Please respond to the followingBased on the discussion prepar.docxPlease respond to the followingBased on the discussion prepar.docx
Please respond to the followingBased on the discussion prepar.docx
 
Please respond to the following in an approx. 5-6 page paper, double.docx
Please respond to the following in an approx. 5-6 page paper, double.docxPlease respond to the following in an approx. 5-6 page paper, double.docx
Please respond to the following in an approx. 5-6 page paper, double.docx
 
Please respond to the followingImagine you have recently .docx
Please respond to the followingImagine you have recently .docxPlease respond to the followingImagine you have recently .docx
Please respond to the followingImagine you have recently .docx
 
Please respond to one (1) the followingRead the article e.docx
Please respond to one (1) the followingRead the article e.docxPlease respond to one (1) the followingRead the article e.docx
Please respond to one (1) the followingRead the article e.docx
 
Please respond to the followingResearch on the Internet a rec.docx
Please respond to the followingResearch on the Internet a rec.docxPlease respond to the followingResearch on the Internet a rec.docx
Please respond to the followingResearch on the Internet a rec.docx
 
Please respond to Question One (bolded) and one additional ess.docx
Please respond to Question One (bolded) and one additional ess.docxPlease respond to Question One (bolded) and one additional ess.docx
Please respond to Question One (bolded) and one additional ess.docx
 
Please respond to the following in a substantive post (3–4 paragraph.docx
Please respond to the following in a substantive post (3–4 paragraph.docxPlease respond to the following in a substantive post (3–4 paragraph.docx
Please respond to the following in a substantive post (3–4 paragraph.docx
 
Please respond to the followingDebate if failing to reje.docx
Please respond to the followingDebate if failing to reje.docxPlease respond to the followingDebate if failing to reje.docx
Please respond to the followingDebate if failing to reje.docx
 
Please respond to the followingCharts and graphs are used.docx
Please respond to the followingCharts and graphs are used.docxPlease respond to the followingCharts and graphs are used.docx
Please respond to the followingCharts and graphs are used.docx
 
Please respond to the followingAppraise the different approac.docx
Please respond to the followingAppraise the different approac.docxPlease respond to the followingAppraise the different approac.docx
Please respond to the followingAppraise the different approac.docx
 
Please respond to the following discussion with a well thought out r.docx
Please respond to the following discussion with a well thought out r.docxPlease respond to the following discussion with a well thought out r.docx
Please respond to the following discussion with a well thought out r.docx
 
Please respond to each classmate if there is a need for it and als.docx
Please respond to each classmate if there is a need for it and als.docxPlease respond to each classmate if there is a need for it and als.docx
Please respond to each classmate if there is a need for it and als.docx
 
please respond to both discussion in your own words in citation plea.docx
please respond to both discussion in your own words in citation plea.docxplease respond to both discussion in your own words in citation plea.docx
please respond to both discussion in your own words in citation plea.docx
 
please respond In your own words not citations1. The Miami blu.docx
please respond In your own words not citations1. The Miami blu.docxplease respond In your own words not citations1. The Miami blu.docx
please respond In your own words not citations1. The Miami blu.docx
 
Please respond in 300 words the followingWe see SWOT present.docx
Please respond in 300 words the followingWe see SWOT present.docxPlease respond in 300 words the followingWe see SWOT present.docx
Please respond in 300 words the followingWe see SWOT present.docx
 
Please respond to the followingReflect on the usefulness .docx
Please respond to the followingReflect on the usefulness .docxPlease respond to the followingReflect on the usefulness .docx
Please respond to the followingReflect on the usefulness .docx
 
Please respond to the followingLeadership talent is an or.docx
Please respond to the followingLeadership talent is an or.docxPlease respond to the followingLeadership talent is an or.docx
Please respond to the followingLeadership talent is an or.docx
 
Please respond to the followingHealth care faces critic.docx
Please respond to the followingHealth care faces critic.docxPlease respond to the followingHealth care faces critic.docx
Please respond to the followingHealth care faces critic.docx
 
Please respond to the followingMNCs, IOs, NGOs, and the E.docx
Please respond to the followingMNCs, IOs, NGOs, and the E.docxPlease respond to the followingMNCs, IOs, NGOs, and the E.docx
Please respond to the followingMNCs, IOs, NGOs, and the E.docx
 

Recently uploaded

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 

Recently uploaded (20)

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 

1) Which of the following are Penetration testing methodology .docx

  • 1. 1) Which of the following are Penetration testing methodology? A. White box model B. Black box model C. Gray box model D. All of the above 2) Which of the following skills are needed to be a security tester? A. Knowledge of network and computer technology B. Ability to communicate with management and IT personnel C. An understanding of the laws in your location and ability to use necessary tools D. All of the above 3) Which of the following are the district layer of TCP/IP? A. Network and Internet B. Transport and Application C. Network, Internet, Transport, Presentation D. A and B 4) Which of the followings are the TCP segment flags? A. SYN flag: synch flag , ACK flag: acknowledgment flag B. PSH flag: push flag, URG flag: urgent flag, STF flag: set test flag C. PSH flag: push flag, URG flag: urgent flag, RST flag: reset flag, FIN flag: finish flag D. A and C 5) Which of the following are properties of User Datagram Protocol (UDP)? A. Fast but unreliable delivery protocol and Operates on Transport layer B. Used for speed but Does not need to verify receiver is
  • 2. listening or ready C. Depends on higher layers of TCP/IP stack handle problems and Referred to as a connectionless protocol D. All of the above 6) Distributed denial-of-service (DDoS) attack is: A. Attack on host from single servers or workstations and Network could be flooded with billions of packets that causes Loss of bandwidth and Degradation or loss of speed B. Attack on host from multiple servers or workstations and Network could be flooded with billions of packets that causes Loss of bandwidth and Degradation or loss of speed C. Attack on server from multiple host or workstations and Network could be flooded with billions of packets causes Loss of bandwidth and Degradation or loss of speed D. None of the above 7) Different categories of Attacks are: A. Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Buffer overflow B. Ping of Death, Session hijacking C. Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Buffer overflow, Ping of Death, Port High jacking (PoH) D. A and B 8) Which of the following are Social Engineering Tactics? A. Persuasion, Intimidation, Coercion B. Persuasion, Intimidation, Coercion, Extortion, blackmailing C. Persuasion, Intimidation, Coercion, Extortion, Urgency D. All of the above 9) Which of the following/s are types of Port Scans? A. ACK scan, FIN scan, UDP scan B. SYN scan, NULL scan, XMAS scan, C. ACK scan, FIN scan, UDP scan, SYN scan, NULL scan,
  • 3. XMAC scan D. A and B 10) Enumeration extracts information about: A. Resources or shares on the network B. Usernames or groups assigned on the network C. User’s password and recent logon times D. All of the above 11) Which of the following are NetBIOS Enumeration Tools? A. Nbtstat command, Net view command, Net use command B. Nbtstat command, Net view command, Dumpsec command C. Nbtstat command, Net view command, Hyena command D. None of the above 12) Dumsec is an Enumeration tool for Windows systems that does the following/s: A. Allows user to connect to a server and “dump”, Permissions for shares, Permissions for printers B. Permissions for the Registry, Users in column or table format, Policies ,Rights, Services C. Allows user to connect to a server and “dump”, Permissions for shares, Permissions for printers and Permissions for the Registry, Users in column or table format D. A and B 13) Which of the following are Tools for enumerating Windows targets? A. Nbtstat, Net view, Net use B. Nbtstat, Net view, Net use and Other utilities C. Nbtstat, Net view, Net use, Nessus D. All of the above 14) Which of the following statements is more accurate about Windows OS? A. Many Windows OSs have serious vulnerabilities
  • 4. B. None of the Windows OSs have any serious vulnerabilities C. A few Windows OSs have any serious vulnerabilities D. All of the Windows OSs have any serious vulnerabilities 15) Which of the following best describes Remote Procedure Call? A. Allows a program running on one host to run code on a remote host B. Allows a program running on one server to run code on another server C. Allows a program running any server to run code on a designated clinet D. None of the above 16) Buffer Overflows occurs when: A. Data is written to a buffer and corrupts data in memory next to allocated buffer B. Normally, occurs when copying strings of characters from one buffer to another C. Data is deleted from a buffer and corrupts data in memory next to deleted buffer D. A and B 17) Microsoft Baseline Security Analyzer (MBSA) is capable of checking which of the following/s? A. Patches, Security updates, Configuration errors B. Blank or weak passwords C. A and B D. None of the above 18) Which of the following/s are Vulnerabilities in Windows file systems? A. Lack of ACL support in FAT and Risk of malicious ADSs in NTFS B. RCP, NetBIOS, SMB, Null sessions C. Windows Web services and IIS
  • 5. D. All of the above 19) An Embedded system is: A. Any computer system that is a general-purpose PC or server and they are in all networks and Perform essential functions B. Any computer system that isn’t a general-purpose PC or server and they are in all networks and Perform essential functions C. Any computer system that isn’t a server or client D. None of the above 20) Object Linking and Embedding Database are Set of interfaces that: A. Enable applications to access data stored in DBMS and relies on connection strings and allows application to access data stored on external device B. Enable applications to access data stored in a server and relies on connection tokens and allows application to access data stored on external device C. Enable applications to access data stored in flat files D. All of the above 21) ActiveX Data Objects are: A. Programming interface for connecting Web applications to a database B. Defines a set of technologies that allow desktop applications to interact with Web C. Network interface for connecting Web applications to a database D. A and B 22) Attackers controlling a Web server can do which of the following/s? A. Deface the Web site and destroy company’s database or sell contents B. Gain control of user accounts and perform secondary attacks
  • 6. C. Gain root access to other application servers D. All of the above 23) Which of the following/s are Web application vulnerabilities? A. Cross-site scripting (XSS) flaws and Injection flaws and malicious file execution and Unsecured direct object reference B. Cross-site request forgery (CSRF) and Information leakage and incorrect error handling and Broken authentication and session management C. Unsecured cryptographic storage and Unsecured communication and Failure to restrict URL access D. All of the above 24) Which of the following statements best describes Wireless Hacking? A. Hacking a wireless network is different from hacking a wired Lan and Port scanning and Enumeration techniques can not be used. B. Hacking a wireless network is not much different from hacking a wired LAN and Port scanning and Enumeration techniques can be used. C. Hacking a wireless network is not much different from hacking a wired LAN and Port scanning technique can be used D. All of the above 25) Cryptography is: A. Process of converting plaintext into ciphertext B. Process of converting ciphertext into plaintext C. Process of converting plaintext into ciphertext and vise versa D. All of the above 26) Which of the following statements is true? A. Cryptography is a new technology B. Cryptography has been around for thousands of years
  • 7. C. Cryptography has been around for hundreds of years D. None of the above 27) Which of the following best describes Hashing Algorithms? A. Takes a variable-length message and produces a fixed-length value (i.e., message digest), Like a fingerprint of the message B. Takes a variable-length message and produces a fixed-length value (i.e., message digest), Like a fingerprint of the message, If message is changed, hash value changes C. Takes a fixed-length message and produces a variable-length value (i.e., message digest), Like a fingerprint of the message, If message is changed, hash value changes D. B and C 1. Who’s responsible for the ad? Look for the logo, which is the symbol representing the brand. When you find it, ask yourself what you know about the brand. Do you like it? Does it have a good reputation? In this case, Zed is responsible for this ad. It’s the company that picked everything in the ad to convince you to buy its products. 2. What is the ad actually saying? Remember to look at more than words. Everything in an ad is a message to you: the pictures, the colors, the feel – and the words. In this ad, you could find a bunch of messages: if you wear Zed clothes, you’ll be hip; you can dress well for not a lot of money; if you buy these new, stylish clothes, you won’t feel guilty; if you wear these clothes; you’ll be happy and have cool friends; if you buy Zed, you’ll be cool like
  • 8. these kids. Basically, whatever you think the ad is saying to you is right. 3. What does the ad want me to do? Buy clothes from Zed. 4. Who do you think this ad is for? Probably girls, maybe ages 12-20. 5. What do you see that makes you think that? The pictures of high school or college girls (though there are two guys, so they may sell guy’s clothes, too). And the logo has a kind of flowery pattern, which might be more for girls. Federal Trade Commission ftc.gov 1. Who’s responsible for this ad? 2. What is the ad actually saying? 3. What does the ad want me to do? 4. Who is the ad for? 5. What do you see that makes you think that? Now it’s your turn Answer these questions to deconstruct this ad: