Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Examination Hacker Examination 1
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Which of the following is not an element of security?
Correct
The elements of security are Confidentiality, Integrity, and Availablity
Incorrect
The elements of security are Confidentiality, Integrity, and Availablity
-
Question 2 of 10
2. Question
A footprinting tactic, popularized by Johnny Long in 2004, involving the manipulation of a search string to search for vulnerabilities
Correct
Google Hacking is a footprinting tactic, popularized by Johnny Long in 2004, involving the manipulation of a search string to search for vulnerabilities
Incorrect
Google Hacking is a footprinting tactic, popularized by Johnny Long in 2004, involving the manipulation of a search string to search for vulnerabilities
-
Question 3 of 10
3. Question
Suppose you are looking for a way to crawl through a website and find information about it. What application do you use?
Correct
Web spiders are applications that crawl through a website and find information about it
Incorrect
Web spiders are applications that crawl through a website and find information about it
-
Question 4 of 10
4. Question
If this flag is set, communication is forcefully terminated
Correct
If the RST (reset) flag is set, communication is forcefully terminated
Incorrect
If the RST (reset) flag is set, communication is forcefully terminated
-
Question 5 of 10
5. Question
This flag is an indication of negotiation between sequence numbers and parameters
Correct
SYN (Synchronize) is an indication of negotiation between sequence numbers and parameters
Incorrect
SYN (Synchronize) is an indication of negotiation between sequence numbers and parameters
-
Question 6 of 10
6. Question
If this flag is set, it indicates an order to close communications
Correct
If the FIN (Finish) flag is set, it indicates an order to close communications
Incorrect
If the FIN (Finish) flag is set, it indicates an order to close communications
-
Question 7 of 10
7. Question
Stan wiretapped his ex-girlfriend’s telephone line to gather information about her new boyfriend. Wiretapping is an example of?
Correct
Sniffing is the process of gathering packets as they pass through wires or airwaves, reviewing the said packets for information. Wiretapping is an example of sniffing.
Incorrect
Sniffing is the process of gathering packets as they pass through wires or airwaves, reviewing the said packets for information. Wiretapping is an example of sniffing.
-
Question 8 of 10
8. Question
All of the examples below are sniffing techniques, except what?
Correct
DAC Flooding is not a sniffing technique
Incorrect
DAC Flooding is not a sniffing technique
-
Question 9 of 10
9. Question
Which of the following definitions best describe MAC Flooding?
Correct
In a MAC Flooding, the attacker floods the switch with a lot of ethernet frames, each with different MAC addresses, thus compromising the switch.
Incorrect
In a MAC Flooding, the attacker floods the switch with a lot of ethernet frames, each with different MAC addresses, thus compromising the switch.
-
Question 10 of 10
10. Question
Which of the following best describes ARP Poisoning?
Correct
ARP Poisoning is the process of injecting faulty entries in machines by changing the ARP cache.
Incorrect
ARP Poisoning is the process of injecting faulty entries in machines by changing the ARP cache.