Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Examination Hacker Examination 1
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
A sniffing technique that is also a type of denial-of-service attack.
Correct
DHCP Starvation is a sniffing technique that is also a type of denial-of-service attack
Incorrect
DHCP Starvation is a sniffing technique that is also a type of denial-of-service attack
-
Question 2 of 10
2. Question
It refers to the process of finding the MAC Address of a system and matching your MAC to it to sniff traffic from it.
Correct
MAC Spoofing refers to the process of finding the MAC Address of a system and matching your MAC to it to sniff traffic from it
Incorrect
MAC Spoofing refers to the process of finding the MAC Address of a system and matching your MAC to it to sniff traffic from it
-
Question 3 of 10
3. Question
It is regarded as the most popular sniffer, mainly because it is stable, works really well, and is free.
Correct
Wireshark is regarded as the most popular sniffer, mainly because it is stable, works really well, and is free
Incorrect
Wireshark is regarded as the most popular sniffer, mainly because it is stable, works really well, and is free
-
Question 4 of 10
4. Question
What is the most widely deployed IDS in the world by far according to Matt Walker?
Correct
Snort is the most widely deployed IDS in the world by far according to Matt Walker
Incorrect
Snort is the most widely deployed IDS in the world by far according to Matt Walker
-
Question 5 of 10
5. Question
What is a firewall?
Correct
A firewall is a program that is made to protect a network from unauthorized external access
Incorrect
A firewall is a program that is made to protect a network from unauthorized external access
-
Question 6 of 10
6. Question
It is a system that is designed to attract would-be attackers
Correct
Honeypots are systems that are designed to attract would-be attackers
Incorrect
Honeypots are systems that are designed to attract would-be attackers
-
Question 7 of 10
7. Question
When traffic is alerted as malicious, even though it is not, what is it called?
Correct
When traffic is alerted as malicious, even though it is not, it is called a false positive.
Incorrect
When traffic is alerted as malicious, even though it is not, it is called a false positive.
-
Question 8 of 10
8. Question
These are devices that check streams of packets for malicious behavior.
Correct
Intrusion detection systems (IDSs) are devices that check streams of packets for malicious behavior
Incorrect
Intrusion detection systems (IDSs) are devices that check streams of packets for malicious behavior
-
Question 9 of 10
9. Question
Which of the following is a trick for active sniffing?
Correct
Getting a switch to close the port you are connected to each, and every time it closes the port you want to sniff is one trick for active sniffing
Incorrect
Getting a switch to close the port you are connected to each, and every time it closes the port you want to sniff is one trick for active sniffing
-
Question 10 of 10
10. Question
What is the best definition for Lawful Interception?
Correct
Lawful Interception is the process of legally intercepting communications between two (or more) parties for surveillance on telecommunications, VoIP (Voice over IP), data, and multiservice networks.
Incorrect
Lawful Interception is the process of legally intercepting communications between two (or more) parties for surveillance on telecommunications, VoIP (Voice over IP), data, and multiservice networks.